Previous Topic

Next Topic

Book Contents

Book Index

Control-M/Tape Security

This chapter describes the procedure used to implement the Control‑M/Tape security interface. It is recommended that you first review the explanations below on the elements that are protected in Control‑M/Tape and then proceed to the step-by-step instructions.