Cargando…

IBM i Security Administration and Compliance.

Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Woodbury, Carol
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chicago : MC Press, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn796384349
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 121121s2012 ilu o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d IDEBK  |d DEBSZ  |d S4S  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCA  |d ICG  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781583477038 
020 |a 1583477039 
029 1 |a DEBBG  |b BV044188452 
029 1 |a DEBSZ  |b 397299761 
035 |a (OCoLC)796384349 
050 4 |a HA32 
082 0 4 |a 005 
049 |a UAMI 
100 1 |a Woodbury, Carol. 
245 1 0 |a IBM i Security Administration and Compliance. 
260 |a Chicago :  |b MC Press,  |c 2012. 
300 |a 1 online resource (429 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 -- Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 -- Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 -- Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 -- The Facts About User Profiles. 
505 8 |a What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 -- Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 -- Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions. 
505 8 |a Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 -- Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 -- Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 -- Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media. 
505 8 |a Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 -- Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 -- Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security. 
505 8 |a Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 -- Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 -- Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 -- Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function. 
520 |a Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a i5/OS. 
630 0 7 |a i5/OS  |2 fast 
650 0 |a Computer security. 
650 0 |a IBM computers  |x Programming. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a IBM (Ordinateurs)  |x Programmation. 
650 7 |a Computer security  |2 fast 
650 7 |a IBM computers  |x Programming  |2 fast 
758 |i has work:  |a IBM i security administration and compliance (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFRFDdqrD6K8ggwyvRPHwd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Woodbury, Carol.  |t IBM i Security Administration and Compliance.  |d Chicago : MC Press, ©2012  |z 9781583473733 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=906259  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL906259 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26535778 
994 |a 92  |b IZTAP