viernes, 30 de noviembre de 2007

Understanding DB2 9 Security

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

Edición: IBM Press (2006)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Regulatory Environment
  2. DB2 Security–The Starting Point
  3. Understanding Identification and Authentication–The First Line of Defense
  4. Securing DB2 on Windows
  5. Authorization–Authority and Privileges
  6. Label Based Access Control
  7. Encryption (Cryptography) in DB2
  8. Ready, Set, Implement?
  9. Database Auditing and Intrusion Detection
  10. SSH for Data-Partitioning on UNIX Platforms
  11. Database Security—Keeping it Current
  12. Final Thoughts: Security—The Human Factor
  13. Appendix A: Independent Security Packages
  14. Appendix B: Kerberos
  15. Appendix C: DB2 Audit Scope Record Layouts
  16. Appendix D: DB2 Audit—Additional Documentation
  17. Appendix E: Security Considerations for DB2
  18. Appendix F: Glossary of Authorization ID
  19. Appendix G: LBAC-Related SYSCAT views
  20. Appendix H: Security Plug-In Return Codes
  21. Appendix I: Detailed Implementation for the Case Study in Chapter 3

Descarga/Download

No hay comentarios: