Understanding DB2 9 Security - Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan

Understanding DB2 9 Security

Buch | Hardcover
432 Seiten
2006
IBM Press (Verlag)
978-0-13-134590-4 (ISBN)
45,90 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Serving as a guide to securing DB2, this book provides DBAs and their managers with security information. It offers practical guidance on post-implementation auditing, and shows how to systematically maintain security on an ongoing basis. Its coverage includes establishing effective security processes, teams, plans, and policies.
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes



Establishing effective security processes, teams, plans, and policies
Implementing identification and authentication controls, your first lines of defense
DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
Auditing and intrusion detection: crucial technical implementation details
Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
Staying current with the latest DB2 security patches and fixes

Rebecca Bond is an IBM recognized DB2 SME with extensive experience in security, and a background in finance, healthcare, and government technology consulting. She holds numerous IBM certifications, including IBM Certified Advanced Database Administrator.   Kevin Yeung-Kuen See, CISSP, software developer at the IBM Toronto Laboratory, has served on the DB2 Security Development team. He is a IBM DB2 Certified Solutions Expert.   Carmen Ka Man Wong, staff software developer for IBM, recently joined the DB2 Continuing Engineering team, where she focuses on the DB2 Process Model. She authored the developerWorks series DB2 Label-Based Access Control.   Yuk-Kuen Henry Chan, advisory software developer at the IBM Toronto Lab, is a member of the DB2 Continuing Engineering team, and former member of the DB2 Security Development team. He is an IBM Certified Solutions Expert.

Erscheint lt. Verlag 20.12.2006
Verlagsort Armonk
Sprache englisch
Maße 241 x 181 mm
Gewicht 966 g
Themenwelt Informatik Datenbanken DB2
Informatik Theorie / Studium Kryptologie
ISBN-10 0-13-134590-7 / 0131345907
ISBN-13 978-0-13-134590-4 / 9780131345904
Zustand Neuware
Haben Sie eine Frage zum Produkt?