Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
Edición: IBM Press (2006)
Idioma: Inglés
Formato: PDF
Contenido:
- The Regulatory Environment
- DB2 Security–The Starting Point
- Understanding Identification and Authentication–The First Line of Defense
- Securing DB2 on Windows
- Authorization–Authority and Privileges
- Label Based Access Control
- Encryption (Cryptography) in DB2
- Ready, Set, Implement?
- Database Auditing and Intrusion Detection
- SSH for Data-Partitioning on UNIX Platforms
- Database Security—Keeping it Current
- Final Thoughts: Security—The Human Factor
- Appendix A: Independent Security Packages
- Appendix B: Kerberos
- Appendix C: DB2 Audit Scope Record Layouts
- Appendix D: DB2 Audit—Additional Documentation
- Appendix E: Security Considerations for DB2
- Appendix F: Glossary of Authorization ID
- Appendix G: LBAC-Related SYSCAT views
- Appendix H: Security Plug-In Return Codes
- Appendix I: Detailed Implementation for the Case Study in Chapter 3
Descarga/Download
No hay comentarios:
Publicar un comentario