Figure 2-1: z/OS UNIX with open systems interfaces
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig28_01_0.jpg)
Figure 2-2: Examples of a parent process issuing fork() and spawn()
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig32_01_0.jpg)
Figure 2-3: z/OS UNIX physical file systems
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig37_01_0.jpg)
Figure 2-4: Hierarchical file systems and mount points
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig38_01_0.jpg)
Figure 2-5: File security packet
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig39_01_0.jpg)
Figure 2-6: The z/OS UNIX initialization process
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig42_01_0.jpg)
Figure 3-1: The z/OS UNIX user dual identity and access rights
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig47_01_0.jpg)
Figure 3-2: RACF user and group profiles
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig51_01_0.jpg)
Figure 4-1: UNIX daemon fork() or spawn()
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig60_01_0.jpg)
Figure 4-2: The UNIX thread concept and the z/OS UNIX implementation
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig62_01_0.jpg)
Figure 5-1: The controlled environment process
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig74_01_0.jpg)
Figure 5-2: pthread_security_np and BPX.SERVER
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig77_01_0.jpg)
Figure 6-2: RACF and the file security packet
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig92_01_0.jpg)
Figure 6-4: Permissions bits in FSP
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig95_01_0.jpg)
Figure 6-5: Permissions bits signification
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig96_01_0.jpg)
Figure 6-6: Octal values for permission bits
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig97_01_0.jpg)
Figure 6-7: Default permission bits for files and directories
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig98_01_0.jpg)
Figure 6-9: z/OS UNIX ACL structure
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig101_01_0.jpg)
Figure 6-10: Security control blocks
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig103_01_0.jpg)
Figure 6-11: Authorization checking flow without ACL
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig104_01_0.jpg)
Figure 6-12: Authorization checking flow with ACL
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig106_01_0.jpg)
Figure 7-1: The MLS security model
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig112_01_0.jpg)
Figure 9-1: Overview of auditing options for z/OS UNIX
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig128_01_0.jpg)
Figure 9-2: Auditing flags in the file security packet
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig129_01_0.jpg)
Figure 9-3: Producing audit reports
![](https://cdn2.percipio.com/1601087337.4f8a2109e6eeccd584986dee2e7b8d2bf58d6ff7/eod/books/23861/images/fig133_01_0.jpg)