Understanding DB2 9 Security

Nonfiction, Computers, Database Management
Cover of the book Understanding DB2 9 Security by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan ISBN: 9780132704434
Publisher: Pearson Education Publication: December 13, 2006
Imprint: IBM Press Language: English
Author: Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
ISBN: 9780132704434
Publisher: Pearson Education
Publication: December 13, 2006
Imprint: IBM Press
Language: English

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

More books from Pearson Education

Cover of the book FileMaker 12 Developers Reference: Functions, Scripts, Commands, and Grammars by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book SOA Principles of Service Design by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Fuzzy Logic and Control by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Adobe InDesign CS6 Classroom in a Book by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Windows 8.1 Administration Pocket Consultant Storage, Security, & Networking by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Living the Dream: Putting your creativity to work (and getting paid) by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Sams Teach Yourself Visual Basic 2012 in 24 Hours by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book jQuery Mobile by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Virtualizing Microsoft Business Critical Applications on VMware vSphere by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Inside Microsoft Dynamics AX 2009 by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Law Express Question and Answer: Tort Law by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Law Express: Contract Law by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book The Definitive Guide to Warehousing by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book The New Language of Marketing 2.0 by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
Cover of the book Sams Teach Yourself WordPress in 10 Minutes by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy