Limit search to available items
Book Cover
E-book

Title Understanding DB2 9 security / by Rebecca Bond [and others]
Published Upper Saddle River, N.J. : IBM Press, 2006

Copies

Description 1 online resource
Contents Ch. 1. regulatory environment -- Ch. 2. DB2 security -- the starting point -- Ch. 3. Understanding identification and authentication -- the first line of defense -- Ch. 4. Securing DB2 on Windows -- Ch. 5. Authorization -- authority and privileges -- Ch. 6. Label based access control -- Ch. 7. Encryption (cryptography) in DB2 -- Ch. 8. Ready, set, implement? -- Ch. 9. Database auditing and intrusion detection -- Ch. 10. SSH for data-partitioning on UNIX platforms -- Ch. 11. Database security -- keeping it current -- Ch. 12. Final thoughts : security -- the human factor -- App. A. Independent security packages -- App. B. Kerberos -- App. C. DB2 audit scope record layouts -- App. D. DB2 audit -- additional documentation -- App. E. Security considerations for DB2 -- App. F. Glossary of authorization ID -- App. G. LBAC-related SYSCAT views -- App. H. Security plug-in return codes -- App. I. Detailed implementation for the case study in chapter 3
Notes Print version record
SUBJECT IBM Database 2. http://id.loc.gov/authorities/names/n91021106
IBM Database 2. blmlsh
IBM Database 2. fast (OCoLC)fst01367762
Subject Database security.
Database management.
Database security.
Database management.
Database management.
Database security.
Form Electronic book
Author Bond, Rebecca, 1950-
ISBN 0131345907
9780131345904