GF20 8172 15_Systems_Management_Bibliography_Aug80 15 Systems Management Bibliography Aug80

GF20-8172-15_Systems_Management_Bibliography_Aug80 GF20-8172-15_Systems_Management_Bibliography_Aug80

User Manual: GF20-8172-15_Systems_Management_Bibliography_Aug80

Open the PDF directly: View PDF PDF.
Page Count: 19

DownloadGF20-8172-15_Systems_Management_Bibliography_Aug80 GF20-8172-15 Systems Management Bibliography Aug80
Open PDF In BrowserView PDF
OF20-8172-15

OENL-OO

Systems Management
Systems Management Bibliography
This bibliography lists and categorizes selected IBM
publications on the management of data processing,
including audidability, data security, systems management,
and generally useful application development techniques
and includes texts, manuals, briefs, bulletins, and papers as
well as certain forms, templates, bibliographies, and indexes.
In most cases, the publications are applicable to various IBM
data processing systems; publications applicable to a specific
data processing system can be found in that system's
bibliography.

---- -----.-- . --- -----. -

--

-~-

Preface
This bibliography lists and categorizes selected IBM
publications on the management of data processing
including auditability, data security, systems management and generally useful application development techniques. In most cases the publications
are applicable to various IBM data processing systems and include texts, manuals, briefs, bulletins,
and papers as well as certain forms, templates, bibliographies, and indexes.
Systems management briefs and systems management manuals are two types of publications
found in this bibliography. The briefs describe a
technique or procedure that helped make a particular data processing installation more effective.
The manuals discuss in more detail - and usually
without reference to a particular installation - data
processing techniques and procedures and other
subjects concerning the management of data processing.

Organization
This special bibliography has two parts:
• Part 1 lists the publications in six different categories; a publication may appear in more than
one category.
• Part 2 contains an abstract of each publication
in order number sequence so that its usefulness
to an installation can be determined. Part 2
also shows the type of publication, the number
of pages and the availability under SLSS
(System Library Subscription Service).

Note: Order numbers are in sequence by the second
character. The first character is the use key, which
governs the availability of the document. Use key
G means that the item is available to customers,
through the IBM representative, without charge for
quantities that meet normal requirements. Use key
S means that the item is for sale through IBM
branch offices.
Bill of Forms
An order number in the form OfGBOF-1234 is a Bill
Of Forms - a single order number for a package of
separately available documents.
Flags on Order Numbers
Maximum case: **GC20-0001-5#
A double asterisk preceding the order number
indicates either a change in the publication (such
as a new edition) or a new item.
When more than one edition of a publication is
current, the order-number suffix is followed by a
number sign (#).

Sixteenth Edition (August 1980)
This is a major revision of, and supersedes,

GF20-8172-14.

Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality.
A form for readers' comments is provided at the back of this
bibliography. If the form has been removed, comments may be
addressed to: IBM Corporation, Technical Publications,
Department 824, 1133 Westchester Avenue, White Plains, New
York 10604. IBM may use or distribute any of the information
you supply in any way it believes appropriate without incurring
any obligation whatever. You may, of course, continue to use
the information you supply.
Preface

Part 1. Classified Listings

Systems Management
G320-5829
Auditability and Productivity Information Catalog
GC20-1853
An Introduction to 3190 Network Management
•• GG22-9001
Capacity Planning - An Introduction
•• GG22-9015
Capacity Planning Implementation
•• G321-5114
A Capacity Planning Methodology
•• G321-5113
overview of the Capacity Planning Process for
Production Data Processing
GE20-0612
Capacity System Planning - Executive Overview
Communications Systems Management Basic Concepts
G320-5840
GK20-0931
Component Failure Impact Analysis at Caterpillar
Component Failure Impact Analysis - An Availability
GC20-1865
Management Technique
GX20- 2336
Component Failure Impact Analysis Grid and Grid
Expansion Worksheets
GK20-0115
A DP Cost Allocation System: Prudential Insurance
GK20-0116
Data Processing Quality Assurance - Martin Marietta
Data Systems - Orlando Data center
.. GC20-1112
Energy Conservation and Management in Data Processing
•• G321-5106
An Integrated Approach to Centralized Communications
Network Management
Management Controls for Data Processing
GF20-0006
Management Planning Guide for a Manual of Data
GC20-1610
Processing Standards
GKlO-6104
Management Reporting and Controls in Data Processing,
National Westminster Bank
Management Services - Frito Lay
GK20-0150
•• GE20-0662
An Architecture for Managing the Information Systems
Business - Volume 1, Management Overview
Managing the Data Processing Organization
GE19-5208
•• GK20-1305
Managing the Move of Comptroller's Data Processing
- State of Iowa
GK20-0132
Managing Systems Development - Montgomery Ward
McAuto Hierarchical Communications in DP Management
GK20-0864
Measuring Programming Quality and Productivity
G321-5063
•• G226-3551
Network Control Center Guide
•• GG22-9003
A perspective on Networking
•• GB21-2521
Account Network Management Program Availability Notice
•• SB21-2524
Account Network Management Program (DOS) Description and
Operations Manual
•• SB21-2522
Account Network Management Program (OS) Description and
Operations Manual
•• GC21-0429
Network Communications Control Facility General
Information Manual
•• GB21-2418
Network performance Analyzer Availability Notice
•• SB21-2419
Network Performance Analyzer Description and Operations
Manual
•• GC34-2010
Network Problem Determination Application: General
Information Manual
Operations Management Extension (OME) Computer Program
GK20-0882
Control of the DP Operation at SMUD
Organizing the Data Processing Activity
GC20-1622
Performance Tuning in OS/VS2 MVS
G321-5011
GK20-1013
Problem and Change Control at the State of Washington
Data Processing Service Center
GE19-5201
Problem and Change Management in Data Processing,
A Survey and Guide
A Project Management System IV Primer
GC20-1862
GK20-1120
Recovery Structured Walk-through at Marine Midland Bank
G321-5040
Service Levels: A Concept for the User and the
Computer Center
•• G321-5115
System capacity and Performance Evaluation
•• G321-5120
Systems Management
•• G229-0282
Systems Management - A Network Perspective
•• G520-3526
Systems Management Assessment Questionnaire
- Supplement
GC20-1811
system outage Analysis - An Availability Management
Technique
•• GK20-1291
System Outage Analysis - Association of American
Railroads
GG22-9000
Tracking and Resolving Problems and coordinating Changes
Application Development
GH20-1628
A Guide to Testing in a Complex System Environment
GF20-0001
Analysis of Some Queuing Models in Real-time Systems
G321-5055
Automated Logical Data Base Design
GE20-0593
Basic Systems Analysis and Design Techniques

1

GE20-0527
GE19-5200
GF20-8093
G321-5042
G321-5053
GF20-8102
G321-5033
G321-5057
G321-5009
GC20-8152
GC20-8078
GA24-3488
GC28-6794
GC20-1851
GC20-1707
GC20-1850#
GC20-8062
GC20- 2000
GN20- 3814
GC20-8096
GE20-0348
GE20-8171
GC20-1776
GC20-1790
GC20-1777
GE20-8091
GF20-0006
GF20-6088
G321-5045
GE20-0090
GE20-8067
GC20-8011
GE20-0396
G320- 5323
GE19-5095
GG22-9011
. . SH20-2116
G321-5032
Auditability
G320-5829
•• G320-5532
G520-3332
G321-5070
G321-5012
GF20-0006
•• G320-6163
•• SH20- 2361
G320-5790
G320-5791
G320-5792
Data Security
G321-5069
G321-5011
G320-2683
G320-5829
G321-5066
G321-5068
G321-5070
G320-5647
G320-5646
G320-1379
G320-1370
G320-1371
G320-1372
G320-1373

Business Systems Planning, Information Systems
Planning Guide
Code Reading, Structured Walk-throughs, and Inspections
- Improved Programming Technologies
Coding Methods
A User-Oriented Data Base Retrieval System
Data Bases: Past, Present, and Future
Decision Tables - A Systems Analysis and Documentation
Technique
Design and Code Inspections to Reduce Errors in Program.
Development
Design Techniques for a User-controlled DB/DC System
Elements of Queuing Theory for System Design
Flowcharting Techniques
Form and Card Design
Form Design Reference Guide for Printers
Guide to PL/S II
HlPO - A Design Aid and Documentation Technique
Identification Techniques
Improved Programming Technologies - An Overview
Index Organization for Information Retrieval
Inspections in Application Development - Introduction
and Implementation Guidelines
Introduction to Data Management Student Text
An Introduction to Information Retrieval
An Introduction to Linear Programming
An Introduction to Structured Programming in COBOL
An Introduction to Structured Programming in FORTRAN
An Introduction to Structured Programming in PL/I
Keyword-in-Context (KWIK) Indexing
Management Controls for Data Processing
Planning for an IBM Data Processing System
A Method of Programming Measurement and Estimation
Principles of Data Acquistion Systems
PERT - A Dynamic Project Control Method
Random Number Generation and Testing
statistics-Based System Techniques, Concepts, Examples,
Applications
Stru,ctured Design
Structured Programming Foil Presentation Script
A Structured Requirements Process Using the Improved
Programming Technologies
3800 System Design and Documentation Aid, IUP 5796-AT
Top-Down Development USing a Program Design Language
Auditability and Productivity Information Catalog
Audit-Source Code compare for S/370 DOS/vS, OS/VS
Availability Notice
An Auditor's perspective of the IBM 8100
Information System
Data Processing Spheres of Control
Generalized Audit Trail Requirements and Concepts for
Data Base Applications
Management Controls for Data Processing
Source Compare/Audit Utility Availability Notice
Source ComparelAudit Utility Program Description
and operations Manual
Systems Auditability and Control, Audit Practices
Systems Auditability and Control, Executive Report
Systems Auditability and Control, Control Practices
Administrative control of Computing Service
An Access Control Mechanism for Computing Resources
Architectural support for System Protection and Data
Auditability and Productivity Information Catalog
A Cryptographic Key Management Scheme for Implementing
the Data Encryption Standard (DES)
cryptography Architecture for Information Security
Data Processing Spheres of Control
An Executive's Guide to Data Security - A Translation
From an IBM Svenska AB Publication
Data Security - Threats and Deficiencies in Computer
Operations - A Report on a Completed Study - A Translation from an
IBM Svenska Publication
Data Security and Data Processing: Session Leader's
Guide (State of Illinois Videotapes)
Data Security and Data Processing: Volume 1 - Introduction
and Overview
Data Security and Data Processing: Volume 2 - Study Summary
Data Security and Data Processing: Volume 3, Part I - State of Illinois
Executive Overview
Data Security and Data Processing: Volume 3, Part I I -

2

State of Illinois Study Results
Data Security and Data Processing: Volume 4 - Massachusetts
Institute of Technology Study Results
G320-1375
Data Security and Data Processing: volume 5 - TRW Systems,
Inc., Study Results
G320-1376
Data Security and Data Processing: Volume 6 - Evaluations
and Installation Experiences: Resource Security System
G320-5649
Data Security Controls and Procedures - A Philosophy for
DP Installations
G520-2882
Data Security Seminars: IBM Education Course X8851 Brochure
GC22-9062
Data Security Through Cryptography
Generalized Audit Trail Requirements and Concepts for
G321-5012
Data Base Applications
G321-5067
Generation, Distribution, and Installation of
Cryptographic Keys
G321-5010
Hierarchical Approach to Computer System Integrity
IBM Cryptographic Subsystem Concepts and Facilities
GC22-9063
IBM Data Security Forum: Denver, Colorado, September 1974
G520-2965
G520-2838
IBM Data Security Symposium, April 1973
IBM 3845/3846 Data Encryption Device GA27-2865
General Information Manual
Management Controls for Data Processing
GF20-0006
G320-5650
Management Memorandum: Security Features of IBM System/370
Operating System Integrity in OS/VS2
G320- 5522
GC28-0942
OS/vSl and Os/VS2 MVS Cryptographic Facility General Information Manual
GBOF-1200
Report of IBM Joint Data Security Studies
GC28-0722
RACF General Information Manual
Security ••• The Right Thing for Your Computer,
G520-2881
The Best Thing for Your Information
G520-2169
The Considerations of Data Security in a Computer
Environment
G520- 2700
The Considerations of Physical Security in a Computer
Environment
G520- 2741
The Fire After the Fire
G520-2797
42 Suggestions for Improving Security in Data Processing
Operations
Fo~ and Templates
GX20-2336
Component Failure Impact Analysis Grid and Grid
Expansion Worksheets
GX28-1630
Decision Table Worksheet
GX20-8020
Flowcharting Template
GX20-8047
Hexadecimal and Decimal Integer Conversion Table
GX20-1971
HlPO Template
GX20-1970
HlPO Worksheet
GX20-1702
Proportional Record Layout Form
GX20-1818
150/10/8 Print Chart
•• GX20-2353
Systems Management Assessment Questionnaire
Bibliographies ~ Indexes
GC20-1764
Atlas of Applications: Volume I - An Alphabetic
Bibliography of Quantitative Methods Applied to Business, Industry,
Science, and Engineering (1961 to 1972)
GC20-1768
Atlas of Applications: Volume II - Bibliography of
Quantitative Methods in Business, Industry, Science, and
Engineering (1972 to 1974)
GC20-1783
Atlas of Applications: Volume III - Bibliography of
Quantitative Methods in Business, Industry, Science, and Engineering
GC20-1141
Management Science at Work - A Bibliography Covering
All Enterprises, All Functions, and All Techniques
G321-5036
Selected Readings: Data Base Systems
GC20-8071
10,000 Division Codes for Proper Names
G320-1374

3

GB21

Part 2. Abstracts

A Session Leader's Guide, form no. G320-1379, will
te distrituted with the tapes.
It is alsc availatle separately from Mechanicsburg for those
who would like to understand the ccntents of the tapes
tefore ordering them.
1.
iihose Right to Know
2.
Fellow that Card
3.
Implerrenting the Information Privacy and Security
Program
4.
Admiriistering the Information Frivacy and Security
Prograro
5.
Eesigning Privacy and Security Into Infcrmation
Systems
6.
Software Security and Tern,inal Access Ccntrol
Concepts
7.
Physical Plant Security
8.
Contingency Planning and Backup Systems
9.
~hat Every Executive Should Kno~ About Privacy In
Information Systems
Customer purchase orders should te sent directly to:
S/T VIJ:EOCASSETTJ;: Duplicating Corp.
500 Willow Tree Noad
Leonia, New Jersey 07605
Tel. (201) 9Q7-6Q50 or N.Y.C. (212) 239- 4653
Nes. 1, 5, 6, 8 cr 9
21.95
Ncs. 2, 3, 4 or 7
23.30
Play tack Machine Required: SONY U-MAtIC 3/Q inch
VIDEOCASSEtTE, or equivalent.
Bill of Material
NOT AVAILABLE UNDER ELSS

GA24-3488
FORM DESIGN REFERENCE GUIDE FOR PRINTERS
This publICation conta~nform~ te considered by
personnel designing, ordering, or using forms for the system
printers listed below.
Tnis manual has two sections: general forms-design
information a~plicable to system printers, and specific
information (Appendix) for particular printers. The general
information relates to items such as form length, ~~dth,
weight, fastenings, and other forms-related items that must

be considered and/or met when forms are designed for system
printers.. The specifications are not intended to be
restrictive, tut to permit the customer to purchase
continuous forms from the manufacturers of his choice.
For detailed information on forms feeding and operating
procedures, see the appropriate component description and
operating procedures manuals for the particular printer er
system ..
companion publications useful in designing forms are:
o
OCR Input Preparation Guide, Order No. GC20-1686
o
Print Chart (Six Lines' per Inch), GX20-1816
o
Print Chart (Eight Lines per Inch), GX20-1818

Another publication which is not an IBM publication but nay
be helpful in designing forms and for comparison purposes is
International Standard ISO, 2784,.. DiIl'>E!nsions in this manual
are to this standard.. IBM printers included are:
1132
3211
3618
1403
3213
3713
1qOq
3215
3715
1q43
3284
3717
2203
3286
3791 Line Printer Feature
2213
3288
3792 Line Printer Feature
2222
3610
5203
3203
3612
5213
3210
Manual. 32 pages

GA27-2865

1m! 38q5 DATA ENCRYPTION DEVICE, 1m! 3846 !lATA ENCRYPTION

DEVICE, ~ INFORMATION
manual describes the IEM 38q5 and 38q6 Data Encryption
Device in sufficient detail to enable propsective users to
decide whether to use this type of data protection.
Physical planning diagrams and specifications are included,
as are general guidelines for the selection and distribution
of key-variables.
Manual, 8 1/2 x 11 inches, 44 pgs, 10/77
~his

GBOF-1200
REPORT OF IBM ~ DATA SECURITY STUDIES
Over two years ago,
IBM announced that it was initiating a program in long range
data security research, technology and documentation. Part
of that program involved a two year joint study with three
IBM customers: The State of Illinois; TRW Systems, Inc.; and
Massachusetts Institute of Technology. An IBM installation
at our Federal Systems Division in Gaithersburg, ~d,.
served as a fourth study site,. Each focused on a
particular aspect of data security. The. groups coapleted
their work this spring, and the results are included in this

GB21-2Q78
NETWORK PERFORMNCE ~ ~ JlQ§!L FDP 5798-CZ!!... NEtWORK
PERFORMANCE ANALYZER
CONTROlLE!!... !!l! ~~ NOTICE
This Availability Notice contains complete ordering
inforIraticn for the Frogram and all its related
documentation, for management and data proceSSing personnel
who are prospective users of the program and others who
require inforn.ation concerning it ..
Written in ALC, the Network Performance Analyzer (NPA)
collects comrounicaticns network operating data fer analysis.
NPA data nay be helpful in highlighting the causes of
performance degradation, such as excessive traffic at
certain periods, or insufficient line capacity. It Ray also
aid in isolating performance problems induced ty high line
or cluster error rates caused by temforary errors, 0% wide
fluctuations in .message rates.
With NPA data, networks may be tuned for greater
efficiency, and potentially improved response tines.
Elements such as polling rates, network paraIl'.eters, and line
loading, may be modified and performance improved. ~uning
nay also free up capacity.
NPA inforK.ation nay also be helpful in capacity
planning. Information sucb as 3705 utilization, message
flow rates, and line usage rates, may help deterIl'.ine hOll!
Kuch unused capacity exists for network growth.
The data tray ce displayed online as collected, or
reviewed later at a tenrinal. Data of particular interest
nay be monitored on er offline fer exceptions to user
defined limits. ~he capability of displaying realtime
information may be es~ecially valuable during periods of
poor performance.. The data gathered is also available for
forItatting into rer:orts for study, and compariscn with
previous feriods,. This allows modification of systens
parameters, and otservance of sutsequent results.
NPA consists of a host application prograrr and one or
nore reodified NCP frograms. It runs under VS1 or MVS, with
VTAM and/or TCAM. NFA can coexist with subsysteIrs such'as
eles, IMS. or TSO, tut operates independently of them.
Flyer, 8 112 x 11.inches, 4 pages, 6/79

=

BOF:

Data Security and Data Processing .••
Volume 1, Introduction and Overview (G320-1370)
Volume 2, Study Summary (G320-1371)
Volume 3, Part 1, State of Illinois: Executive
overview (G320-1372)
Volume q, Study Results; Massachusetts Institute
of Technology (G320-1374)
Volume 5, Study Results: TRW Systems, Inc.
(G320-1375)
Volume 6, Evaluations and Study Experiences:
Resource Security System (G320-1376)
Volume 1, for executive, contains an introduction to the
data security and privacy issues and an overview of the
findings of the data security studies.
Valune 2, a more detailed summary of the data security
study is for management and will be of special interest to
those charged with implementation,.
Volume 3, Part 1, an executive overview primarily concerning
.privacy was prepared by the State of Illinois stt;d , team .•
The remaining volumes provide a number of detailed technical
papers that may be of interest to various other people
within customer accounts.
A complete set of nine State of Illinois Videotapes on
security and privacy for use by agencies within the State
are additionally available.
~'hese tapes will, however be applicable to a more general
audience -- not just to those involved with state
gove,rmrent.
A complete set of tapes is being sent to each region.
The tapes may be loaned to branch offices for loan to
customers for short periods of time 13-5 days).
Customers may wish to borrow individual tapes to show them
to an employee group or to determine whether they are
interested in purchasing them.

SB21-2479
PERFORIIANCE ANALYZER ~ HOS~, l!lR 5798-CZR, ~
EERFORMANCE ~
CONTROLLER, FCP ~~
DESCRIPTION/OPERATIONS
This Program Descriftion/operations Manual provides t~e user
with sufficient information to understand, install and
successfull~ use the program.
Fer further information about this publication, see
abstract for GB21-2478.
Manual, 8 112 x 11 inches, 139 pages, 6/79
~

=

GB21-2521

ACCOUNT NnWORR I;ANAGEMENT ~~ FOP 5798-DA2
(OS/VS/CICS), FDP 5798-DAT, (DOSIVS/CICS), ~OTICE
This Availability Notice contains complete ordering
information for the Frogram and all its related
documentatiGn, for management and data proceSSing personnel
who are prospective users of the program and others who
require inforn:ation concerning it.
This FOP, wLitten in ALC, is specifically designed to
automate the core elements of systems ulanagellent with an
integrated set of interactive application programs and batch
report programs as fellows:
The problerr management application provides ~reformatted
screens to ensure consistent protlem reporting, assignment
and resolution of system or network incidents. It has
create, update, display, and browse functions, allo~in9
nultiFle aSSignments on problems and permits extensive
comments. All fields except the comments are editable and
searchatle. History files can be created for batch
reporting.
4

GC20

GB21
The change management application provides preformatted
screens to enable planned, coordinated change activities
including. equipment installation or relocation; new
application programs; PUT and engineering changes, and
feature changes. It likewise, has create, update, display
and browse functions and includes an approver/reviewer
facility. All fields are editable and searchable. History
files can te created for batch reports.
The network configuration application provides an online
data base of network components and the ability to create,
update and display records containing component details.
Detail may include: component name, id characteristics,
location, phone numbers, vendor information, etc. The
configuration file supports display of the physical
connectivity of components.

GC20-1768

BIBLICGRAPHY OF
INDUSTRY, SCIE~ ANI:

volume to Atlas of Applications
(GC20-1764). The older manual was based on 8,300 references
covering the years 1961 to 1972 and gathered frorr 350
journals. Like the elder manual, Atlas of Applications •••
Volume II is a collection of references to applications of
quantitative n,ethods in business, industry, engineering, and
science. The quantitative method may be fran mathematiCS,
statistics, operations research, or managea,ent science. The
data on which the alphatetic index is based is a collection
of 3,000 references to journal articles or to fafers given
at conferences. ~he journals and periodicals scanned cover
the years 1972 to 1974.
SpeCial Eitliography, 200 pages
SLSS - ORDER NO. SUBSCRIPtION ONLY

The batch report facility

provides a network map, component detail listings and change
activity.

Flyer. 8 1/2.x 11 inches. 4 pages, 8/79

with sufficient information to understand, install and
successfully use the program.
For further information about this program, see abstract
for GB21-2521.
Manual, 8 1/2 x 11 inches, 360 pages, 8/79

GC20-1772
ENERGY CONSERVATIo,N ~ND M~NAGE~ENt IN L~TA PROCESSING
This manual examinesseveral aspects oreIiergy conservation
and management that nay te of value to installations using
IBM data proceSSing equipment, and fresents sane
considerations involved in developing and implen,enting plans
for ccntrolling ccnsumftion and minimizing the impact of
energy shortages on data processing operations.
Manual
SLSS - ORI:ER NO. SUEECRIPtION ONLY

SB21-2524
ACCOUNT MANAGEMENT NETWORK PROGRAMS, DOS/VS/CICS. T-DP
5798-DAT, DESCRIPTION/OPERATIONS
This Program Description/Operations Manual provides the user
with sufficient information to understand,· install and
successfully use the program.
For information regarding this program, see abstract for
GB21-2521.
Manual, 8 1/2 x 11 inches, 354 pages, 8/79

GC20-1776
AN INtRODUCT ION TC STRUCTURED PROGRAMMING IN COECL
This text, intended-for progranmers, descrIEes-and
illustrates the use cf structured programT,ing. 'Ihe
technique and its sU~t;:crting practices are generally
descrited in one chapter. A reference chapter illustrates
the imt;:lenentation of the technique in COBOt and is followed
by a chapter presenting two sarr.t;:le frograrrs. A knowledge of
COBOL is assurred.
Manual

SB21-2522
ACCOUNT NETWORK MANAGEMENT PROGRAMS OS/VS/CICS. FOP
5798=IiAQ. DESCg];PTIO~OPERA~

This Program DescriptionJo~erations Manual provides the user

GC20-1622
o,RGANIZING THE DATA PROCESSING ACTIVITY
This text is-designed to help the organizational planner
develop the data proceSSing structure best suited to his own
needs and environment. It is directed primarily to data
proceSSing managers, the executives to whom they report, and
others responsible for organizational and personnel
t;:lanning,.. The major topics discussed are: concepts
applicable to organizing the data processing activity,
t;:ossible locations of the data processing activity within
the larger organization, data proceSSing functions, grouping
of functions into an organizational structure, and grouping
of functions into job families and job fositions,.. The
Appendix provides some typical job descriptions.
Manual, 128 pages
SLSS - ORDER NO,. SUBSCRIPTION ONLY

GC20-1777
AN INtRODUCTION TO SlRtCTURED PRCGRAMMING IN PL/I
This text, intend€d~r progranrners, descrTEes-aDd
illustrates the use of structured prograrrming. The
technique and its supporting practices are generally
described in one chaFter. A reference chapter illustrates
the implen.entation of the technique in PL/I and is followed
by a cha~ter .,resenting two saIr~le prograIrs. A knowledge of
PL/I is assurred.
Manual

GC20-1783
ATLAS o,F APPLICATICNS VOLUME III,
BIBLIOGRAPHY Q!: .Il2t!'!UtAtIVE MET~ .!!:!
BUSINESS, INDUSTRY, SCIENCE, ~~§INEERING
This nanual is a fellow-on volume to Atlas of Applications
(GC20-1764) and Atlas of Applications Voluroe II (GC20-1768).
The older manuals were ~ased on 11,300 references covering
the years 1961 to 1974 and gathered from 350 jcurnals. Like
the older rranuals, Atlas of Applications Volmt",e III is a
collection of references to applications of quantitative
rrethods in business, industry, engineering, and science.
The quantitative method may be frOIr mathen.atics, statistics,
operations research, er managenent science. The data on
which the alphabetic index is tased is a collection of 2,500
references to journal articles or to papers given at
conferences. The jcurnals and periodicals scanned for this
volume were Irastly 1975 issues.
Eitliography, 185 .,ages, 3/76
SLSS - ORDER NO. SUBSCRIPTION ONLY

GC20-1707
IDENTIFICATION TECHNIQUES
~is manual ext;:lains and compares a survey of several tyt;:es
of coding techniques for individuals and non-individuals.
An afproach to improving coding methods involving a
statistical approach is outlined. The publication is
baSically a state-of-the-art description of the
identification teChniques.
Data ProceSSing Techniques Manual, 50 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY
GC20-1741
MANAGEMENT SCIENCE AT WORK
A BIBLIOGRAPHY COVERING ALL ENTERPRISES. ALL FUNCTIONS.
AND ALL TECHNIQ~ A great number of problems in industry, in science r and
in engineering can be solved by the systematic methods
of mathenatics, statistics, and operations researchmanagement science~ This manual is a specially organized
three-way index to almost 5000 journal articles and
conference papers which have mentioned the application
of analytic methods to various business, industrial, and
scientific protlems.
Manual, Special Bibliography, 112 pages
SLSS - ORDER NO,. SUBSCRIPTION ONLY

GC20-1790
AN INtRODtCTION TO SlRUCTURED PROGRA~MING IN FORtRAN
This text, intended fer programmers, describe~
illustrates the use of structured pragranrring. 'Ihe
technique and its supporting practices are generally
described in one chafter. A second chapter illustrates the
implementation of the technique in FOR'IRAN and is followed
by a chapter presenting two sample prograres. A knowledge of
FORTRAN is assumed.
Manual. 8 1/2 x 11 inches, 48 pgs., 7/77

GC20-1764
ATLAS OF APPLICAtIONS (I) AN ALPHABETIC BIBLIOGRAPHY OF
QijANt·ITATIVE ~ APPUED 1Q EUSINESS. INDUSTRY, SCIENCE,
~ND ENGINEERING (1961 TO 1972)
~his manual is a collection of references to applications of
quantitative methods in business, industry, engineering, and
science. The quantitative method may be from mathematics,
statistiCS, operations research, or management science. The
data on which the alphabetic index is based is a collection
of 8,300 references to journal articles or to papers given
at conferences. Some 350 journals and periodicals were
scanned, covering the years 1961 to 1972
Manual, 293 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY

GC20-1850
IMPROVED PROGRAMMING tECHNCLOGIES - ~N OVERVIEW
~u"ent is intended to briefly-descrite-8ix recently
forttalized techniques designed to improve the ~rogram development process: structured pragran,n:ing, toP-d9wn frcgram
development, chief programmer teams, HIPC (Hierarchy plus
Input-Process-output), and structured walk-throughs.
Manual
SLSS - ORI:ER NO. SUBSCRIPtIo,N ONLY
GC20-1851
HIPo, :: ~ J:ESIGN H12 liND ~!~!!Q!i 1ECHNIQUE
The purpose of this manual is to describe a deSign aid and
docuIrentation technique called HIPC - Hierarchy ~lus Input5

GC27

GC20
Process-output. The manual is intended fcr systems analysts
and programmers and describes ho. to use HlPO as a design
aid and documentation technique throughout ~e development
cycae.
Manual
SLSS - ORDER NO. SUBSCRIPTION ONLY

GC20-8062
INDEX OaGANIZATION !SH INlORMATION !!lS!!]!!
Methods of indexing vary with the nature of the naterial
to be indexed and the ways in .hicb this material .ill be
used. This beok presents, in sittplified form, the basic
principles behind organizing indexes of various types.
It is written to help systems personnel understand the
proble~s

GC20-1862
A PROJECT MANAGEMENT SYSTE~ IV PRIMER
this prirrer is intend~ use-as-a-learning tool by the
person who will be responsible for creating input data to
PMS IV from project data (CPM diagrams, task lists,
dependency lists, etc;). It assumes only a limited
knowledge of data processing concepts, and is written for
those already familiar with net.ork planning, resource

they will encounter in crganizing infcrmation for

eventual retrieval.
StreSSing that an indexing systes shculd always be
developed in the light of the particular retrieval prcblem,
and that the specific eqUipment to te used is a secondary
conSideration, the book covers name indexing, special
indexing !including auto-encoding and the I for the IBM 3276
Display Station· .and tbe IBM 3776 !Models 1 alld 2)
Corrs.unication Teninal'
.
This .anual descri.bes the cryptographic Subsystelli and
the Cryptographic concepts and techniques errplcyed.
Manual, 8 U2 x 11 inches, q8 pgs, 10/77

GC20-8011
RANDOM NUMBER GENERATlON AND TESTING
Random sattpling, simulation studies, and MOnte Carlo methods
have been in use for sany years. Papers describing various
aspects of these topics have appeared in technical journals
and textbooks available to a relatively small percentage
of computer users. Meanwhile. applications requiring
random numbers are becoming more imPortant and'more cosmon
in bUSiness and industry as well as purely scientific
areas. ";rherefore,. this manual has been prepared which
gives the mathematical development of the power residue
method, outlines computer techniques for implementing it
and also offers brief corrments on otber methods. An
appendix provides programming illustrations for binary and
decimal com~uters.
DP Techniques Manual, 12 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY

GC27-0q29

RR GOMMUNICATIO~S £2!!!~ FjlCI:LITY H.£ ~ 573~-XX6
A INfORMATION
.:
.
~
T
manual is an overvie. of the prograrr product Net.ork
Cott·nunicstionS Contrcl Pacility (NCCF). It is directEd to

6

GC27

GE20

customer executives, systen administrators, system analysts,

system programmers, application prograroners, and terminal

GE19-5201

GC28-0722
OS/VS2 MVS RESOURCE ACCESS CONTROL FACILITY (RACF) - GENERAL
INFoRMATIoN MANUAL - PROG PROD 5740::xxa- - - - - - - This publication contains overview a~planning information
for Version 1, Release 3 of the Resource Access Control
Facility (RACF) progran prcduct (5740-XXH). It is intended
for the use af installation managers and personnel
responsible for systeIr data security.. It is assumed that
the reader is fa~iliar with OS/VS2 (MVS).
RACF is a program product that provides access control
by identifying and verifying system users, authorizing
access to system resources and logging detected unauthorized
attempts to enter the systeIl'- and detected accesses to
frotected resourceS4
Manual~ 8 1/2 x 11 inches~ 56 pgs~ 3/78

GC28-0942
Os/VS1 and OS/VS2 MVS PROGRAMMED

CRYPTOGR~PHIC

GENERALlNF~oN:-PRoG PROD 5740-XY5

FACILITY
----

The Progranmed 'cryptographic Facility Program Product
provides OS/VS2 MVS installation with the capability to
protect sensitive data through the use of cryptography.
This publication is intended for installation managers and
system programmers responsible for planning the software
data security strategy fer their installation.
Chapter 1 introduces the general sutject of cryptography
and provides an overview of the Programrred Cryptographic
Facility. Cha~ter 2 identifies system requirements.
Chapter 3 descrites each cerr~onent of the facility and
describes how they work together to provide a cryptographic
capability. Chapter 4 defines the functicns available tc
the user and chapter 5 identifies planning, security, and
operating considerations.
Manual, 8 1/2 x 11 inches, 48 pgs, 10/77

GC28-6794
GUIDE TO PL/S II
~he piIS ~ompiler is a proprietary program used by IBM to
develop other r;::rograrr.s that are made generally available.
This provides general inforn:ation on understanding and
interpreting PL/S I I listings. The book also provides some
guidelines on how to modify compiler generated assembler
code. Readers wi 11 be ex{:erienced systerr.s progranm:ers who
need to understand and possitle modify cf:erating system
modules. They should know the basic assembler language such
as PIlI.
Manual, 56 pages
SLSS - ORDER NC. SUBSCRIPTION ONLY

GE19-5208
MANAGING ~HE DATA PRCCESSING ORGANIZATICN
This tookis cfferea-as-aDaidtoeffective nanagenent of
the data Frocessing crganization. It gives an overview of
sorr,e im{:ortant management principles and sho\lis hc~ these
princifles can be apflied to data proceSSing to ensuxe its
economic use. ErrJ;hasis is on nanagerr,ent net hods of
irr.proving overall productivity and quality in data
processing, rather than cn prograrrrring and software
engineering techniques. The took covers all the rrajcr
elenents cf a Ir,anagenent systerr for the data processing
organizaticn and includes chapters dealing with evaluation
and selection of applications~ long range planning, short
range planning~ prcject managen:ent~ operations nanagErrent~
and managerrent reforting. It is directed primarily tc data
processing managers ~ tut «,ay alsc l:e cf interest to senior
rranage~ent to whom data processing managers report, to users
of conputer services~ and to others with an interest in good
data ~rocessing managerrent.
Manual, 146 pages, 11/76
SLSS - ORtER NO.. SUB fCRIFUON ONLY
GE20-0090
PRINCIPLES Q! DATA ACCUISITION §X§!.!l!:!.§
For IBM custorrers whc require a tasic understanding of the
fUnctions of data acquisition systems~ this nanual t:rcvides
an introductory descripticn of their operation and use in
a system environll\€nt. This manual acquaints the reader
with many of the various items of hardware conncnly
encountered in data acquisition systems ~ the rr,eans of
connecting then in a systen. conf iguraticn and the central
processing unit~ featUres and programming capatilities
necessary for efficient operation.
~anual~ 27 pages
SLSS - CRtER NC. SUESCRIFTION ONLY
GE20-0348
AN IN~ROtUCTION TC INFORMA~ION RE~RIEVAL
This manual uses~he~anguage of~he-ncnspecialist to
fresent ways in which digital computers can te used in
inforrraticn storage and retrieval systems.. Indexing
nethods~ file organization~ and search strategies are
discussed~ and a ,erief titliography is included.
The Il',anual
is intended as a first reader for those interested in the
broad aspects of data tanks and nechanized libraries.
Manual~ 38 pages
SLSS - ORtER NO. SUB~CRIP~ION ONLY

GC3Q-2010
NETWORK PROBLEM DETERMINATION APPLICATION (NPDA)
GENERAL INFORMATION PROGRAM NUMBER 5735-XX-8-~his document provides introductory-information about the
IBM Network Problem Determination Application (NPDA) Program
Product~ which allo~s a user to record~ retrieve and exaRine
communication network error data in an interactive
environment. The docunent frovides a general description of
NPDA as well as initial planning information needed for
installation.
Ma~ual~ 8 1/2 x 11 inches~ 18 pages~ 10/78

GE20-0396
SYStE~ ~ECHNIQUES CONCEPtS, ~~MPLESL
APPLICATICNS - APFLICA~ION MANUAL
This is an intrOductcry-rev~anual cn sixteen techniques
for analyzing and improving systems~ whether business,
industrial ~ scientific ~ or engineering. There are questions
and answers~ short examples~ tasie concepts~ and an
applicaticn bibliografhy for each method. The Ir.anual is to
serve as an awareness tool; difficult topics such as
confidence lireits estimation procedures~ and analysis of
variance are deen~hasized. The techniques covered are Eayes
and cluster analysis~ continuous sinulation, correlation and
decision analysis~ discrete simulation~ discrinination and
econometric analysis evolutionary operation~ eXFerimental
design~ eXfonential srrccthing; factor, Markov~ qu€ue~
regression~ and tirre series analysis.
Manual~ 53 pages
SLSS - ORtER NO. SUE SCRIPTION CNLY

.§TATIS~ICS-BASED

GE19-5095
STRUCTURED PROGRAMMING FOIL PRESENTATION SCRIPT
This presentation---eiPlares- one of the IR,proved Prograrrrring
T"echnologies known as Structured Prograrrming.. A comparison
is wade with traditional programming followed by a
discussicn of the varicus structure types and consideration
of some typical prograrrroing situations.
The presentation was developed in 1975 by the Improved
Prograrrming ~echnologies SUfFort Group en assignn'.ent at the
~orld Trade Systems Center in Zoetermeer~ Netherlands.
Manual~ 96 pages~ 12/75
SLSS - ORDER NO. SUBSCRIPTION ONLY

GE20-0527
BUSINESS SYSTEM§

GE19-5200
£Ql2.!!; READING, STRUCTURED WALK-THROUGHS

~

=

~ ANt CHANGE ~~Nl\GEMENT 1B flAU f!!Qill.§!.!!§
~
AND GUIDE
A-rack of coordination and control in dealing with data
processing prctlems can be costly~ in terns not cnly cf
resources wasted tut also of user dissatisfacticn. This
rranual presents an a~Frcach to reducing such costs - the
introduction of systematic problem handling to sfeed prcblero
solving~ ease corrrrunicaticns~ and enatle as rrany protlems as
possible to be trated as routine. Prctlerrs are eften caused
ty changes to prograns cr equipnent~ so {:roblem incidence~
and thus costs~ can te reduced when control of the
installation of changes is improved.
Manual~ 84 pages~ 2/79
SLSS - ORDER NO. SUB~CRIF~ION ONLY

operators who are operating with DOS/vS or OS/VS systeIr.s.
Manual, 8 1/2 x 11 inches, 40 pages, 10/78

G~

INSPECTIONS-

!~!.!!~

INFOBMA~ION

SYS~E~ !~~~~1~§

Business Systems Flar.ning (BSP) is a structured a~proach
to help an organizaticn establish an infcrn,aticn systems
plan that can satisfy its near and long tern infcrmation
needs. ~his guide cffers assistance to ESP study teams by
explaining the approach and presenting guidelines for
conducting a BSP stuoy. It can also be used for general
reference on tte sutject of planning for inforrration
systens.
The guide covers BSP principles, concepts, and study
overview, then devctes a chapter to each of the n.ajor
activities of a ESF study, and includes a final chapter to
acquaint the reader with follow on projects.
~anual~ 92 pages
SLSS - ORDER ~C. SUESCRIPTION CNLY

IMPROVED PRCGRAMMING TECHNOLOGIES
This document addresses itself to the discovery of errors
and suggests how three sUfforting techniques within the
Improved Programming Technclogies help to approach the
ultirrate goal: error-free software.
The three techniques described here are: code reading,
structured walk-throughs, and inspections. Their use within
IBM has offered Significant benefits. ~'he intent of this
dOcuIr.ent is to suggest how they might be of value, either
individually or collectively, within other data proceSSing
organizations.
Manual, 10 3/8 x 8 1/4 inches, 56 pages, 3/76
SLSS - ORDER NO. SUBSCRIPTION ONLY

7

GE20

GH20

GE20-0593
BASIC SYSTEMS ANALYSIS ~~ DESIGN TECHNIQUES
This application manual~ intended to assist the beginning
applications analyst in learning the basics of systems
analysis and design, and will also help the artalystto
decide how to proceed into the "whats, hows. and whys"
involved in such things as test plans, doc~ents of
understanding, testing. tracking mechanisms, etc.

A numter

of topics are addressed, mostly from the "what to do" and
"how to do it" point of view. The section "Major Events in
Designing and Im~lementing a System" should help a newcomer
to systems analysis to have an idea as to where to begin and
the questions to ask.
Manual, 45 pages, 8/78
GE20-0612
CAPACITY
PLANNING: EXECUTIVE OVERVIEW
The objective of Capacity System Planning is to translate
business ~lans into the data processing capacity needed to
support those plans. To accomplish this, significant
milestones based on business plans are set up over a numl:er
of years into the future, and the data processing growth
plan is used to determine how much data processing capacity
will be required at each milestone. This overview descril:es
what that effort involves and what results it can produce.
Manual, 7 1/4 x 11 inches, 12 pages, 7/78
GE20-0662
AN ARCHITECTURE FOR
~ INFORMATION ~
BUSINESS, ~ 1 MAN
~
The purpose of this
ment is to build an understandirtg of
the architecture,processes, and data elements that comprise
the Information Systems business. From this understanding
the reader may begin to implem~nt effective control and
efficiency in the management of data processing. The
document gives an overview of SOme fundamental management
~rinciples, and suggests how these can be applied to the
data processing organization within the framework of the
Information Systems Architecture.
Manual, 8 1/2 x 11 inches, 49 pages, 01/80
GE20-8067
n!!! ::: ~ ~ PROJECT CONTROL mllQ!2
Designed to acquaint the reader with the PERT technique.
It is divided into these sections - (1) the technique its advantages and implementation, (2) the network
development, (3) the computer program - data preparation,
and (4) description of PERT in operation, including sample
calculations.
tp Application Manual,28 pages
SLSS- ORDER NO. SUBSCRIPTION ONn

rum

GE20-8091

KEY~ORD-IN-CONTEXT (RWIC) INDEXING
.
KWIC indexes constitute a new approach to the problem of
how to furnish information promptly about new literature.
This manual presents the principles and .advantages of RWIC
indexing and gives essential details about the parts of
an overall RWIC index -- the KWIC index proper, reference
code, bibliography and author index. An extensive list
of recommendations is included for preparing master
~achinable records.
This involves reserving particular
card columns for specific items and includes suggested
punctuation substitutions and other special indications.
The manual also gives instructions for ~achine printout,
mounting copy for reproduction, and· binding.
CP Techniques Manual, 24 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY

GE20-8171
AN INTRODUCTION :!2 ..~ I?ROGRAI!MING
~
This manual is a primer on what can be accottplished on a
computer with linear programming systems. ~h~ presentation
covers the entire scope of linear programming application:
problett formulation, computer operations, interpretation
of results, and additional information that can be obtained
through the use of complete linear progra~ming system for
a computer. The mahual assumes no mathematical background
l:eyond high school algebra.
'
The first chapter deals with concepts and examples of
linear programming," The second chapter deals with deriving
additionalinforttation about a solution. The third chapter
completely describee·a larger example of linear programming
in oil refinery scheduling.' The fourth cha~ter is a
descriptiOn of the sittplex method of linear programming_
A detailed glossary of linear programming terms is included.
Manual, 67 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY
GF20-0006
MANAGEMENT·CONTROLS FOR DAT}! PROCESSING
This manual, written-Ey PrICe Waterhouse' CO., discusses
external and internal controls necessary for data proceSSing
systems, the responsibilities for these ccntrols,' and the
impact of these controls on the audltability of the sYstems.
Both batch·· and online versions of an application system
'
il~ustratin9 oontr~l ~rocedures are also included, as is an
audit/review questionnaire that can be used as a guide when
conducting an audit or review of data processing department
controls.

Mallual, 95 pages
SLSS - ORDER·NO. SUBSCRIPTION ONLY

'

GI'20-0007
}!NALYSIS OF SOliE QUEUING MODELS !!! REAL-TIME.~
This manual presents asic theory which descril:es
relationships among the principal elements in a queuing
situation. Several queuing models are discussed, and the
theory is applied to 32 short examples of problems
encounterEd in real-timE systems I numerical solutions are
given for these prctlems. The manual concerns single
server and multi-server queues, machine interference,
networks of queues, and combinations of random variables
encountered in queuing analysis.
Manual, 75 pages
SLSS - ORDER NO. SUBSCRIPTION ONLY
GF20-8093
~ !!ruQ!l2

Specifj.c ,.ethods of alphabetic and numerical coding are
discussed, also the way in which they may be developed and
applied. The ~anual lists and describes the characteristics
that should be included in the ccnstruction of adequate
codes.
Manual, 20 pages
SLSS - ORCER NO. SUBSCRIPTION ONLY
GF20·8102

TABLES ::: ~ g~ ~ M!!: OOCUMENT}!TION
TECHNI UE
The aS1C concepts of decision tal:les and a minimum set
of conventions for their use in systems analysiS, procedure
design, and documentation are described. The purpose of
such tablES is to pro~ide information in a cOllcise format
that is easy to read and understand. The tabular approach
is used to express complex decision logic in a ,.anner that
encourages the analyst to reduce a problem to its Simplest
fortt by arranging and ~resenting logical alternatives under
various conditions. The resultant tables present a system's
logiC in a concise manner that is easy to visualize and
grasp. ~hile the ccncepts in the test are presented on
a level fcr co~·prehension by students in basic ccmputer
courses, the techniques are applicable at all levels of
sophistication by everyone in a data processing environment.
Manual, 8 1/2 x 11 inches, 20 pgs, 4/78
SLSS - ORDER NO.. SUBSCRIPTION ONLY
~

GG22-9000
ll!! SlfS'IEM/370
TRACKING!m1 RESOLVING PROBLEMS ~·COORCINAmg CHANGES
This is One of a series of Techn1cal Bulletins distributed
by the Poughkeepsie Systems center; This report is intended
to assist the DP manager in the development arid'
imple~entation of fortt,al ~roblem managett,ent and change
control procedures within the DP function,.
It is directed primarily to DP managers and to the
executives to whott they report. It describes functions that
can be integrated as a single unit into the existing CP
organization.
.
Technical Bulletin, 61 pages
SLSS - ORCER NO. SUBSCRIPTION ONLY
GG22-9001
~ INTRODUCTION !Q CAPACITY PL}!N~
This tulletin in intended an as introduction to the concepts
and methodol09ll of capacity planning·and how ca~acity
planning can be a ·u~eful management tool in the complex data
processing ~nvironment. Specific topics covered.include
definitions of terms, performance ~easuremertt, ~ethod
implementation and ~erforRance prediction' An atpendix
contains visuals for a capacity planning ~resentation.
Technical Bulletin ~anual, 8 1/2 x 11 inches, 136 pages,
2/17
GG22-9003
A PERSPECTIVE ON NETWCRRING
This Technical-SulIe~for IB~ ana custo~er ~erscnnel.
Its purpos~ is to ~rcv~de some insight into the issues and
ccm~lexities of networking.
It also aiscusses hcw these
interact with various implementaticn configuraticns.
Manual, 8· 1/2 x 11 inches, 48 pgs, 5/77
GG22-9015
...
.
CAPACITY FLANNING IMILEMENTATION TECHNICAL BULLETIN
This iechnical Bulletin is intended for aata-proeessing
people (technical andmls. The sYIllbols, and their use in

GC20-1851. The HlPO Worksheet, GX20-1970, also may be used
in the preparation of HI PO diagrams.
Template, 10 to a set
NOT AVAILABLE UNDER SLSS
GX20-2336
COMPONENT FAILURE IMPAc~r ANALYSIS FORMS: COMPONEN'I FAILURE
~ ANALYSIS GRID ANQ GRIt EXPANSION~WORRSHEET
This padded form is used in performing a component failure

impact analysis ICFIA). Its use is illustrated in the
manual Component Failure Impact Analysis - An Availability
Manage"ent 'Iechnique (GC20-1865).
padded form, 11 x 16 inches, 2 pgs, 3/79
GX20-2353
SYSTEMS MANAGEMENT ASSESSMEN'I QUESTIONNAIRE
The Systems Management Assessment Questionnaire is a set of
yes/no questions to evaluate the implementation of the
Systems Management disciplines:
Change Management
Performance Managment
Problem Management
Capacity Management
Processing Management
Audit/Security Management
Recovery Management
Management Re~ortin9
There is also a sutjective evaluation for each

discipline regarding the extent to which the items in that
category are effectively utilized.
In addition, there are questions on which tools and aids
are utilized for Systems Management.

This questionnaire

'~as

prepared jointly bY the nata

Processing and Field Engineering Divisions.

Foldout reference card, 3 1/2 x 8 1/2 inches, 14 panels,
10/79
GX20~8020

FLOWCHARTING TEMPLATE
This plastiC template p:rovides cut-out shapes for drawing

standard symbols used frequently in flowcharting computer
systems and programs. It is enclosed in an envelope
outlining definitions of symtols and use of the template.
More details are given in the Data Processing Techniques

manual on FLOWCHARTING TECHNIQUES (GC20-8152).
Template, 10 to a set
NOT AVAILABLE UNDER stss

OR~ER

NO. SUBSCRIP'IION ONLY

G320-1372

SECURITY , DATA FROCESSING: VOLUME 3 PART 1
STATE

C

:l

Fold and tape

Please Do Not Staple

Fold and tape

• • • • • • • • • 0.1 • • • • • • • • • • • • • • • • • • • I • • • • I • • • • • • • • • • • I • • • I • • • • • • • • • • • • • • • • • • • I I ~ • • 11 • • • • • • • • 0 . 1 • • • • • • • • I I • • • • • • I I I I I • • • • • • • 11 • • • • 10 • • • • I • • I I • • • • • • • I • • • • • I I ' I I . I I • • • 0 . 1 I • • • I I I I • • • • • • • 1 • • • 1 • • • 1 • • • • • I I • • 1 • • • • • 1 • • _ • • • •

111111

First Class
Permit 40
Armonk
New York

Business Reply Mail
No postage stamp necessary if mailed in the U.S.A.
-n
CD
,2

?

Postage will be paid by:

G')

m
2

International Business Machines Corporation
Department 824
1133 Westchester Avenue
White Plains, New York 10604

Fold and tape

Please Do Not Staple

§

Fold and tape

==-=
=®
------...-.......
---- - - ---.. -

--

~--

-~-.-

International Business Machines Corporation
Data Processing Division
1133 Westchester Avenue. White Plains. N.Y. 10604
IBM World Trade Americas/Fer East Corporation
Town of Mount Pleasant. Route 9, North Tarrytown, N.Y., U.S.A. 10591
IBM World Trade Europe/Middre East/Afri~a Corporation
360 Hamilton Avenue. WhitePtains. N.Y .• U.S.A. 10601.,

I
I
I
I
I

I

GF20-8172-15

."

c;-

z

?

G>

m
Z

r-

8

==-=
- ---.-.=®

--

-- ---.- --,.-------...
~--~-

International Business Machines Corporation
Data Processing Division
1133 Westchester Avenue. White Plains. N.Y. 10604

IBM World Trade Americas/Far East Corporation
Towr. of Mount Pleasant. Route 9. North Tarrytown. N.Y .. U.S.A. 10591
IBM World Trade Europe/Middle East/Africa Corporation
360 Hamilton Avenue. White Plains. N.Y .• U.S.A. 10601



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Create Date                     : 2011:09:30 17:49:38-08:00
Modify Date                     : 2011:09:30 18:02:52-07:00
Metadata Date                   : 2011:09:30 18:02:52-07:00
Producer                        : Adobe Acrobat 9.45 Paper Capture Plug-in
Format                          : application/pdf
Document ID                     : uuid:30f27c64-af30-4cc5-aeb1-5fe9e62b0b1b
Instance ID                     : uuid:2cbfa3ab-1b89-48a9-9e1d-e71194e2095f
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 19
EXIF Metadata provided by EXIF.tools

Navigation menu