Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding DB2 9 Security

Buy
Understanding DB2 9 Security, 9780131345904 (0131345907), IBM Press, 2006
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes
About the Author


Rebecca Bond is an IBM recognized DB2 SME with extensive experience in security, and a background in finance, healthcare, and government technology consulting. She holds numerous IBM certifications, including IBM Certified Advanced Database Administrator.

 

Kevin Yeung-Kuen See, CISSP, software developer at the IBM Toronto Laboratory, has served on the DB2 Security Development team. He is a IBM DB2 Certified Solutions Expert.

 

Carmen Ka Man Wong, staff software developer for IBM, recently joined the DB2 Continuing Engineering team, where she focuses on the DB2 Process Model. She authored the developerWorks series DB2 Label-Based Access Control.

 

Yuk-Kuen Henry Chan, advisory software developer at the IBM Toronto Lab, is a member of the DB2 Continuing Engineering team, and former member of the DB2 Security Development team. He is an IBM Certified Solutions Expert.

(HTML tags aren't allowed.)

32/64-bit 80x86 Assembly Language Architecture
32/64-bit 80x86 Assembly Language Architecture
This book discusses 32- and 64-bit 80x 86 assembly language programming inclusive of the SIMD instruction supersets that bring the 80x86 processor into the realm of the supercomputer. This book can be used in a self-taught or academic environment.

The increasing complexity of programming environments provides a number of opportunities for...

Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). The text provides a...
Oracle SQL Loader: The Definitive Guide
Oracle SQL Loader: The Definitive Guide
SQL*Loader is a ubiquitous tool in the Oracle world. It has been shipped with Oracle since at least Version 6 and continues to be supported and enhanced with each new version of Oracle, including Oracle8 and Oracle8i. The job of SQL*Loader is to load data from flat files into an Oracle database. It's optimized for loading large volumes of...

Internetworking Troubleshooting Handbook
Internetworking Troubleshooting Handbook
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Learn how to improve your C# coding skills using unit testing. Despite it's name, unit testing is really a coding technique, not a testing technique. Unit testing is done by programmers, for programmers. It's primarily for our benefit: we get improved confidence in our code, better ability to make deadlines, less time spent in the debugger, and...
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
The biggest challenge and opportunity for IS departments approaching Windows 2000 is probably Active Directory (AD), which can reduce total cost of ownership (TCO) and simplify administration. For any IS professional or administrator, Windows 2000 Active Directory Survival Guide provides both a high-level introduction and a hands-on guide...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy