|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn796384349 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
121121s2012 ilu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d IDEBK
|d DEBSZ
|d S4S
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCO
|d OCLCA
|d ICG
|d OCLCQ
|d OCLCO
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781583477038
|
020 |
|
|
|a 1583477039
|
029 |
1 |
|
|a DEBBG
|b BV044188452
|
029 |
1 |
|
|a DEBSZ
|b 397299761
|
035 |
|
|
|a (OCoLC)796384349
|
050 |
|
4 |
|a HA32
|
082 |
0 |
4 |
|a 005
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Woodbury, Carol.
|
245 |
1 |
0 |
|a IBM i Security Administration and Compliance.
|
260 |
|
|
|a Chicago :
|b MC Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (429 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 -- Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 -- Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 -- Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 -- The Facts About User Profiles.
|
505 |
8 |
|
|a What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 -- Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 -- Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions.
|
505 |
8 |
|
|a Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 -- Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 -- Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 -- Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media.
|
505 |
8 |
|
|a Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 -- Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 -- Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security.
|
505 |
8 |
|
|a Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 -- Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 -- Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 -- Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function.
|
520 |
|
|
|a Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a i5/OS.
|
630 |
0 |
7 |
|a i5/OS
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a IBM computers
|x Programming.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a IBM (Ordinateurs)
|x Programmation.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a IBM computers
|x Programming
|2 fast
|
758 |
|
|
|i has work:
|a IBM i security administration and compliance (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFRFDdqrD6K8ggwyvRPHwd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Woodbury, Carol.
|t IBM i Security Administration and Compliance.
|d Chicago : MC Press, ©2012
|z 9781583473733
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=906259
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL906259
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26535778
|
994 |
|
|
|a 92
|b IZTAP
|