Understanding DB2 9 Security (eBook)
Pearson Education (Verlag)
978-0-13-270443-4 (ISBN)
Note: CD-ROM/DVD and other supplementary materials are not included.
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
This book's material is organized to support you through every step of securing DB2 in Windows, Linux, or UNIX environments. You'll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.
Coverage includes
Establishing effective security processes, teams, plans, and policies
Implementing identification and authentication controls, your first lines of defense
DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
Encrypting DB2 connections, data 'in flight,' and data on disk: step-by-step guidance
Auditing and intrusion detection: crucial technical implementation details
Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
Staying current with the latest DB2 security patches and fixes
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM(R) DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security. This book's material is organized to support you through every step of securing DB2 in Windows(R), Linux(R), or UNIX(R) environments. You'll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis. Coverage includes Establishing effective security processes, teams, plans, and policies Implementing identification and authentication controls, your first lines of defense DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection Encrypting DB2 connections, data "e;in flight,"e; and data on disk: step-by-step guidance Auditing and intrusion detection: crucial technical implementation details Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments Staying current with the latest DB2 security patches and fixes
Erscheint lt. Verlag | 13.12.2006 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Datenbanken ► DB2 |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-13-270443-9 / 0132704439 |
ISBN-13 | 978-0-13-270443-4 / 9780132704434 |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.