Ch. 1. regulatory environment -- Ch. 2. DB2 security -- the starting point -- Ch. 3. Understanding identification and authentication -- the first line of defense -- Ch. 4. Securing DB2 on Windows -- Ch. 5. Authorization -- authority and privileges -- Ch. 6. Label based access control -- Ch. 7. Encryption (cryptography) in DB2 -- Ch. 8. Ready, set, implement? -- Ch. 9. Database auditing and intrusion detection -- Ch. 10. SSH for data-partitioning on UNIX platforms -- Ch. 11. Database security -- keeping it current -- Ch. 12. Final thoughts : security -- the human factor -- App. A. Independent security packages -- App. B. Kerberos -- App. C. DB2 audit scope record layouts -- App. D. DB2 audit -- additional documentation -- App. E. Security considerations for DB2 -- App. F. Glossary of authorization ID -- App. G. LBAC-related SYSCAT views -- App. H. Security plug-in return codes -- App. I. Detailed implementation for the case study in chapter 3