Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding DB2 9 Security

Buy
Understanding DB2 9 Security, 9780131345904 (0131345907), IBM Press, 2006
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes
About the Author


Rebecca Bond is an IBM recognized DB2 SME with extensive experience in security, and a background in finance, healthcare, and government technology consulting. She holds numerous IBM certifications, including IBM Certified Advanced Database Administrator.

 

Kevin Yeung-Kuen See, CISSP, software developer at the IBM Toronto Laboratory, has served on the DB2 Security Development team. He is a IBM DB2 Certified Solutions Expert.

 

Carmen Ka Man Wong, staff software developer for IBM, recently joined the DB2 Continuing Engineering team, where she focuses on the DB2 Process Model. She authored the developerWorks series DB2 Label-Based Access Control.

 

Yuk-Kuen Henry Chan, advisory software developer at the IBM Toronto Lab, is a member of the DB2 Continuing Engineering team, and former member of the DB2 Security Development team. He is an IBM Certified Solutions Expert.

(HTML tags aren't allowed.)

The Unofficial Guide to LEGO MINDSTORMS Robots
The Unofficial Guide to LEGO MINDSTORMS Robots

The LEGO® MINDSTORMS™ Robotics Invention System (RIS) is a wildly popular kit for building mobile robots. This book contains all the information you need to get the most out of your kit. Based on hands-on robot projects, the book includes descriptions of advanced mechanical techniques, programming with third-party software,...

Build Your Own Website The Right Way Using HTML & CSS
Build Your Own Website The Right Way Using HTML & CSS
Build Your Own Website The Right Way Using HTML & CSS teaches web development from scratch, without assuming any previous knowledge of HTML, CSS or web development techniques. This book introduces you to HTML and CSS as you follow along with the author, step-by-step, to build a fully functional web site from the ground up.

...

Database Design (Sams Teach Yourself)
Database Design (Sams Teach Yourself)
Database Design is the book you need to master the fundamentals of relational database design in today's ever-evolving world of database technologies. This book takes an approach to database design to teach the reader how to reach into the inner depths of an organization to understand the business needs, data, and daily processes that will all...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Recent Innovations in Computing: Proceedings of ICRIC 2020 (Lecture Notes in Electrical Engineering, 701)
Recent Innovations in Computing: Proceedings of ICRIC 2020 (Lecture Notes in Electrical Engineering, 701)
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20–21 March 2020 at the Central University of Jammu, India, and organized by the university’s Department of Computer Science & Information Technology. It includes the latest research in the...
The Handbook of Microbiological Media for the Examination of Food
The Handbook of Microbiological Media for the Examination of Food

Responding to an estimated 14 million cases of food-borne disease that occur every year in the United States alone, the Food and Drug Administration and US Department of Agriculture have begun implementing new regulations and guidance for the microbial testing of foods. Similarly, Europe and other regions are implementing stricter oversight,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy