Tectia Server 6.5 for IBM Z/OS Administrator Manual

Total Page:16

File Type:pdf, Size:1020Kb

Tectia Server 6.5 for IBM Z/OS Administrator Manual Tectia Server 6.5 for IBM z/OS Administrator Manual 15 December 2015 Tectia Server 6.5 for IBM z/OS : Administrator Manual 15 December 2015 Copyright © 2007–2015 SSH Communications Security Corporation This software and documentation are protected by international copyright laws and treaties. All rights reserved. ssh® and Tectia® are registered trademarks of SSH Communications Security Corporation in the United States and in certain other jur- isdictions. SSH and Tectia logos and names of products and services are trademarks of SSH Communications Security Corporation. Logos and names of products may be registered in certain jurisdictions. All other names and marks are property of their respective owners. No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, for any purpose, without the prior written permission of SSH Communications Security Corporation. THERE IS NO WARRANTY OF ANY KIND FOR THE ACCURACY, RELIABILITY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING. For Open Source Software acknowledgements, see appendix Open Source Software License Acknowledgements in the Administrator Manual. SSH Communications Security Corporation Kornetintie 3, FI-00380 Helsinki, Finland 3 Table of Contents 1. About This Document .......................................................................................................... 9 1.1. Introduction to Tectia Server for IBM z/OS ....................................................................... 10 1.2. System Authorization Facility ......................................................................................... 10 1.3. Sample Files ............................................................................................................... 10 1.4. Documentation Conventions ........................................................................................... 11 1.4.1. Operating System Names ........................................................................................ 11 1.5. Customer Support ........................................................................................................ 12 1.6. Terminology ................................................................................................................ 12 2. Installing Tectia Server for IBM z/OS .................................................................................. 15 2.1. Preparing for Installation ............................................................................................... 15 2.1.1. System Requirements ............................................................................................. 15 2.1.2. Permission Requirements ........................................................................................ 15 2.1.3. System Limits and Requirements .............................................................................. 17 2.1.4. Directories and Data Sets ........................................................................................ 17 2.1.5. Licensing ............................................................................................................. 19 2.1.6. Uploading Files Required for Installation ................................................................... 19 2.2. Installing Tectia Server for IBM z/OS .............................................................................. 21 2.2.1. Installing the Tectia SSH Assistant ISPF Application .................................................... 21 2.2.2. Installation Settings and Defaults .............................................................................. 25 2.2.3. Generating Product Installation Jobs .......................................................................... 29 2.2.4. Running the Product Installation Jobs ........................................................................ 33 2.2.5. Enabling Manual Pages ........................................................................................... 34 2.3. Upgrading from Tectia Server for IBM z/OS Version 6.x ...................................................... 35 2.3.1. Uploading Files Required for Upgrade ....................................................................... 35 2.3.2. Upgrading to Tectia Server for IBM z/OS 6.5.0 ........................................................... 36 3. Getting Started with Tectia Server for IBM z/OS .................................................................. 39 3.1. Running the SSH Server (sshd2) ..................................................................................... 40 3.1.1. Starting the Server ................................................................................................. 40 3.1.2. Stopping the Server ................................................................................................ 41 3.1.3. Restarting the Server .............................................................................................. 41 3.1.4. Querying the Server Version .................................................................................... 42 Tectia Server 6.5 for IBM z/OS Administrator Manual © 2007–2015 SSH Communications Security Corporation 4 Tectia Server 6.5 for IBM z/OS 3.1.5. Setting Options for Starting the Server ....................................................................... 43 3.2. Running the Certificate Validator (ssh-certd) ..................................................................... 44 3.2.1. Starting the Certificate Validator ............................................................................... 44 3.2.2. Stopping the Certificate Validator ............................................................................. 45 3.2.3. Restarting the Certificate Validator ............................................................................ 45 3.2.4. Querying the Certificate Validator Version .................................................................. 46 3.2.5. Setting Options for Starting the Certificate Validator ..................................................... 46 3.3. Environment Variables for Server and Client Applications .................................................... 46 3.4. Setting Up a Shell User ................................................................................................. 47 3.4.1. Authenticating Remote Server Hosts ......................................................................... 48 3.4.2. Using Password Authentication ................................................................................ 48 3.4.3. Using Public-Key Authentication .............................................................................. 49 4. Configuring the Server ...................................................................................................... 51 4.1. Server Configuration Files ............................................................................................. 51 4.1.1. Editing Configuration Files ..................................................................................... 52 4.1.2. Command-Line Options ......................................................................................... 52 4.1.3. Running Tectia and OpenSSH on the Same Host .......................................................... 52 4.1.4. IPv6 Support ........................................................................................................ 53 4.2. Defining Subconfigurations ............................................................................................ 53 4.2.1. Host-Specific Subconfiguration ................................................................................ 54 4.2.2. User-Specific Subconfiguration ................................................................................ 55 4.3. Configuring Cryptographic Algorithms ............................................................................ 55 4.3.1. Configuring Ciphers ............................................................................................... 55 4.3.2. Configuring MACs ................................................................................................ 56 4.3.3. Configuring KEXs ................................................................................................. 57 4.3.4. Configuring Host Key Signature Algorithms ............................................................... 57 4.3.5. Configuring Public Key Signature Algorithms ............................................................. 59 4.3.6. Cryptographic Hardware Support .............................................................................. 60 4.4. Configuring Root Logins .............................................................................................. 61 4.5. Restricting User Logins ................................................................................................ 61 4.6. Configuring Code Pages ................................................................................................ 64 4.7. Defining Subsystems .................................................................................................... 64 4.8. Auditing ..................................................................................................................... 64 4.8.1. Configuring Logging in sshd2 ................................................................................. 65 4.8.2.
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • CA ACF2 for Z/OS Quick Reference Guide
    CA ACF2™ for z/OS Quick Reference Guide r12 Third Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only and are subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be used or disclosed by you except as may be permitted in a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • CA ACF2™ R14 SP1 for Z/OS Security Target
    CA ACF2™ r14 SP1 for z/OS Security Target Version 1.1 March 7, 2011 Prepared for: CA 2400 Cabot Drive Lisle, IL 60532 Prepared by: Booz Allen Hamilton Common Criteria Testing Laboratory 900 Elkridge Landing Road, Suite 100 Linthicum, MD 21090-2950 Page 1 Table of Contents 1 Security Target Introduction ....................................................................................... 7 1.1 ST Reference ....................................................................................................... 7 1.1.1 ST Identification ............................................................................................. 7 1.1.2 Document Organization .................................................................................. 7 1.1.3 Terminology .................................................................................................... 8 1.1.4 Acronyms ...................................................................................................... 10 1.1.5 References ..................................................................................................... 11 1.1.6 CC Concepts ................................................................................................. 11 1.2 TOE Reference.................................................................................................. 12 1.2.1 TOE Identification ........................................................................................ 12 1.3 TOE Overview .................................................................................................
    [Show full text]
  • IBM Multi-Factor Authentication for Z/OS
    IBM Multi-Factor Authentication for z/OS Ross Cooper, *CISSP IBM z/OS Security Software Design and Development NewEra – The z Exchange 10/24/2017 Current Security Landscape 1,935 81% Number of security incidents Number of breaches in 2016 with confirmed data due to stolen and/or disclosure as a result of weak passwords.1 stolen credentials.1 (18% worse than prior year) (506 worse than prior year) 60% $4 million Number of security The average total cost incidents that are from 2 of a data breach. insider threats. 3 Criminals are identifying key employees at organizations and exploiting them with savvy phishing attacks to gain initial access to the employees’ system and steal their account credentials. This puts emphasis on the need for tighter restrictions on access privileges to key data repositories.1 1 2017 Verizon Data Breach Investigations Report 2 Ponemon: 2016 Cost of Data Breach Study: Global Analysis 2 3 IBM X-Force 2016 Cyber Security Intelligence Index User Authentication Today on z/OS • Users can authenticate with: ‒ Passwords ‒ Password phrases ‒ Digital Certificates ‒ via Kerberos • Problems with passwords: ‒ Common passwords ‒ Employees are selling their passwords ‒ Password reuse ‒ People write down passwords ‒ Malware ‒ Key log ‒ Password cracking 3 Compliance PCI DSS v3.2 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication. 8.3.1 Incorporate multi-factor authentication for all non-console access into the Cardholder Data Environment (CDE) for personnel with administrative access. Note: This requirement is a best practice until January 31, 2018, after which it becomes a requirement.
    [Show full text]
  • CNS Lecture 13
    In the news CNS Lecture 13 Microsoft workstation server buffer overflow Microsoft XML core services remote code execution Network defenses Microsoft agent buffer overflow IPsec WinZip remote code execution Virtual Private Networks (VPNs) Wireless security Kerberos Trusted systems Secure OS CNS Lecture 13 - 2 Network security You are here … Attacks & Defenses Cryptography Applied crypto VULNERABILITIES COUNTERMEASURES • denial of service • disable denial of service disable • Risk assessment •Random numbers •SSH – ICMP smurf, redirects, unreachable • configure properly – SYN flooding • xinetdxinetd,, tcpwrappers • Viruses – frag, teardrop – filters (allow, deny) •Hash functions •PGP • • Unix security impersonationimpersonation – audit and alarm – host rename (LAN) • filtering portmap MD5, SHA,RIPEMD • • S/Mime – DNS • application filtering ((securelibsecurelibsecurelib)))) authentication – source routing • patches • Network security •Classical + stego •SSL • Session capture/modification • scanners ((NessusNessusNessus,, ISS) – TCP seq number guessing • Firewalls,vpn,IPsec,IDS firewalls •Number theory •Kerberos – TCP hijacking • intusionintusion detection & response • Forensics – sniffing • encryption, virtual private networks ((VPNsVPNsVPNs)))) • • • Server/application attacks Symmetric key IPsec – application flooding (ftp,mail,echo) – buffer overflows DES, RijndaelRijndael,, RC5 •Crypto APIs – Software bugs •Public key •Secure coding RSA, DSA, DD----H,ECCH,ECC CNS Lecture 13 - 3 CNS Lecture 13 - 4 Where to encrypt? Internet
    [Show full text]
  • Identity Manager 3.6.1 Fan-Out Driver for Linux and UNIX Administration Guide Novdocx (En) 24 March 2009
    novdocx (en) 24 March 2009 March 24 (en) novdocx AUTHORIZED DOCUMENTATION Administration Guide Novell® Identity Manager Fan-Out Driver for Linux* and UNIX* 3.6.1 December 10, 2009 www.novell.com Identity Manager 3.6.1 Fan-Out Driver for Linux and UNIX Administration Guide novdocx (en) 24 March 2009 March 24 (en) novdocx Legal Notices Novell, Inc. and Omnibond Systems LLC. make no representations or warranties with respect to the contents or use of this documentation, and specifically disclaim any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. and Omnibond Systems LLC. reserve the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. and Omnibond Systems LLC. make no representations or warranties with respect to any software, and specifically disclaim any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. and Omnibond Systems LLC. reserve the right to make changes to any and all parts of the software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of the other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • Java Security and Z/OS
    Front cover Java Security on z/OS - The Complete View Comprehensively describes z/OS security services for Java applications Provides use cases illustrated with Java program examples Discusses industry-class Java applications Patrick Kappeler Jonathan Barney Pierre Béda Michael Buzzetti Saheem Granados Ebbe Mølgaard Pedersen Kin Ng Michael Onghena Eysha Powers Martina Schmidt Richard Schultz ibm.com/redbooks International Technical Support Organization Java Security on z/OS - The Complete View December 2008 SG24-7610-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2008) This edition applies to Version 1, Release 10 of z/OS (Program Number 5694-A01). © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team that wrote this book . xi Become a published author . xiii Comments welcome. xiii Part 1. Java and Security . 1 Chapter 1. Overview of Java on z/OS . 3 1.1 Why to choose Java . 4 1.1.1 Introduction to the Java programming language. 4 1.1.2 Java package . 4 1.2 Java Native Interface . 5 1.2.1 Basic elements of the Java Native Interface. 6 1.2.2 JNI and Security . 9 1.3 Accessing z/OS MVS datasets from Java. 9 1.3.1 Using the Java Record I/O API . 10 1.3.2 Using the JZOS toolkit API . 10 1.3.3 Running a Java program as a batch job .
    [Show full text]
  • A Short Course Computer Viruses
    A Short Course on Computer Viruses by Dr. Frederick B. Cohen Copyright c ASP Press, 1990 { All Rights Reserved ISBN# 1-878109-01-4 ASP Press PO Box 81270 Pittsburgh, PA 15217 USA Contents 0.1 Introduction 1 Computer Virus Basics 1.1 What is a Computer Virus? 1.2 How Do Viruses Spread Through Systems? 1.3 What Damage Could A Malicious Virus Do? 1.4 Some Other Things Malicious Viruses Might Do 1.4.1 A Data Diddling Virus 1.4.2 The Random Deletion Virus 1.4.3 A Production Destruction Virus 1.4.4 A Protection Code Changing Virus 1.4.5 A Network Deadlock Virus 1.4.6 An Ex- ecutive Error Virus 1.4.7 A Covert Channel Virus 1.4.8 Synergism in Attack 1.5 What Could a Benevolent Virus Do? 1.5.1 Maintenance Viruses 1.5.2 Distributed Databases with Viruses 1.5.3 Life for Its Own Sake 1.5.4 Practical Limits 1.6 Viruses in Specific Computing Environments 1.6.1 Viruses in MVS 1.6.2 PC, MacIntosh, and Amiga Viruses 1.6.3 Viruses in Unix and VMS 1.6.4 Viruses in LANs 1.7 The Three Differ- ences 1.7.1 Generality 1.7.2 Range of Effect 1.7.3 Persistence 1.8 High Risk Activities 1.9 Summary 2 Real World Viruses 2.1 Some Early Experiments 2.1.1 The First Scientific Experiment 2.1.2 A Compression Virus 2.1.3 A Bell-LaPadula Based System 2.1.4 Instrumentation 2.1.5 Psychological Effects of Experi- ments 2.2 The Computer Virus Record Book 2.2.1 The Smallest 2.2.2 The Fastest on a PC 2.2.3 Spreading in Networks 2.2.4 Other Time Dependent Indications of Interest 2.3 Real World Computer Viruses 2.3.1 The Xerox Worm 2.3.2 The First Maintenance Viruses 2.3.3 The Lehigh
    [Show full text]
  • The Problem with Passwords
    EXECUTIVE BRIEFING The problem with passwords Enhancing your mainframe security: password insecurity, data breaches and multi-factor authentication Mark Wilson, Technical & Security Director, RSM Partners Ltd - Discussion Paper Introduction: stronger by design? Mainframe systems are built to be both reliable to steal system logins and credentials. If you are still and scalable, more so than most other systems and authenticating users with passwords alone then moving endpoints. The problem is their security is often taken to multi-factor authentication (MFA) is long overdue. for granted. This should be of serious concern, given that around 80% of the world’s system-of-record data Securing the mainframe: protecting resides on mainframe systems, and more commercial your critical assets transactions are processed on mainframes than on any other platform. Too often, however, mainframe security ● Mainframes hold 80% of the world’s business data has failed to be a priority, with the standard security ● Mainframes host critical core IT for 92 of the world’s posture that everyone has read access to everything. top 100 banks, 18 of the world’s 25 top retailers, Just because a mainframe is deep within a network, 23 of the 25 top airlines, all of the world’s top 10 behind three firewalls, and at the back of your data insurers – and 71% of Fortune 500 companies center, doesn’t mean it is secure. To the bad actors the ● Mainframes host more transactions daily mainframe is simply “another server” to be attacked. than Google (1.3m/second CICS versus 68,542/ second Google) - including 55% of all enterprise Arguably the greatest threats are insider threats: the bad transactions actors won’t be looking to target a system or application Mainframes handle 90% of all credit card but are more likely to target individuals and attempt ● transactions Scary stuff: password insecurity Standard mainframe security approaches are not names.
    [Show full text]
  • CA ACF2™ R15 for Z/OS
    PRODUCT SHEET: CA ACF2 FOR z/OS we can CA ACF2™ r15 for z/OS CA ACF2™ for z/OS (CA ACF2™) provides innovative, comprehensive security for your business transaction environments, including z/OS UNIX and mainframe LINUX — helping your business realize the reliability, scalability and cost-effectiveness of the mainframe. In conjunction with CA Technologies distributed security solutions, CA AFC2 helps secure your entire enterprise. Overview There is increased concern about the security issues that arise when establishing Web links to valuable mainframe data. Many organizations are also required to comply with government regulations, including HIPAA, SOX, PCI and GLBA, and existing corporate policies and industry agreements. With the introduction of new technologies for the mainframe, new security and compliance concerns are rapidly developing. To stay abreast of today’s challenges, organizations must strengthen security, streamline administration and provide enhanced auditing and compliance capabilities. Benefits CA ACF2 delivers out-of-the-box access control software for z/OS operating systems, which includes interfaces for CICS, z/OS Unix (formerly known as OMVS) and IMS (and an optional add-on for DB2). CA ACF2 mechanisms provide flexibility and control to help you monitor and adjust your security policies and accommodate virtually all organizational structures. Administrative tools, extensive reporting options, online monitoring and automatic logging capabilities accompany CA ACF2 to secure your environment while enabling comprehensive auditing and controlled sharing of data and resources. CA ACF2 r15 for z/OS Mainframe 2.0 CA ACF2 has adopted key Mainframe 2.0 features that are designed to simplify your use of CA ACF2 can enable your staff to install, deploy and maintain it more effectively and quickly.
    [Show full text]
  • Supplier Security Standard
    Supplier Security Standard Effective Date: October 2020 Table of Contents 1.0 Introduction and Purpose ....................................................................................................................... 5 2.0 Supplier Security Requirements ........................................................................................................... 6 2.1 Comprehensive Security Program & Practices ............................................................................ 6 2.2 Supplier Personnel .......................................................................................................................... 7 2.3 Duty of Care & Use Restrictions .................................................................................................... 8 2.4 Return/Destruction/Maintenance of Scoped IT Assets ............................................................. 8 2.5 Physical Security ............................................................................................................................. 9 2.6 Network & Communications Security ......................................................................................... 10 2.7 Infrastructure/Platforms/Services/Desktop/Operations Security ........................................ 10 2.8 Additional Software Provisions .................................................................................................... 12 2.9 Identity and Access Management ..............................................................................................
    [Show full text]