|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm85872525 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070315s2006 nju o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCG
|d TXJ
|d CEF
|d OCLCQ
|d MBB
|d DEBSZ
|d OCLCQ
|d OCLCO
|d CNNAI
|d OCLCF
|d OCLCQ
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 0131345907
|
020 |
|
|
|a 9780131345904
|
029 |
1 |
|
|a CHBIS
|b 006148784
|
029 |
1 |
|
|a CHVBK
|b 171132130
|
029 |
1 |
|
|a DEBSZ
|b 35536252X
|
029 |
1 |
|
|a GBVCP
|b 61723082X
|
029 |
1 |
|
|a HEBIS
|b 291433650
|
029 |
1 |
|
|a AU@
|b 000067099864
|
035 |
|
|
|a (OCoLC)85872525
|
037 |
|
|
|a CL0500000008
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D314
|b U64 2006
|
082 |
0 |
4 |
|a 005.7565 D278 Und 2006 [ONLINE]
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Understanding DB2 9 security /
|c by Rebecca Bond [and others].
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b IBM Press,
|c 2006.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Ch. 1.
|t regulatory environment --
|g Ch. 2.
|t DB2 security -- the starting point --
|g Ch. 3.
|t Understanding identification and authentication -- the first line of defense --
|g Ch. 4.
|t Securing DB2 on Windows --
|g Ch. 5.
|t Authorization -- authority and privileges --
|g Ch. 6.
|t Label based access control --
|g Ch. 7.
|t Encryption (cryptography) in DB2 --
|g Ch. 8.
|t Ready, set, implement? --
|g Ch. 9.
|t Database auditing and intrusion detection --
|g Ch. 10.
|t SSH for data-partitioning on UNIX platforms --
|g Ch. 11.
|t Database security -- keeping it current --
|g Ch. 12.
|t Final thoughts : security -- the human factor --
|g App. A.
|t Independent security packages --
|g App. B.
|t Kerberos --
|g App. C.
|t DB2 audit scope record layouts --
|g App. D.
|t DB2 audit -- additional documentation --
|g App. E.
|t Security considerations for DB2 --
|g App. F.
|t Glossary of authorization ID --
|g App. G.
|t LBAC-related SYSCAT views --
|g App. H.
|t Security plug-in return codes --
|g App. I.
|t Detailed implementation for the case study in chapter 3.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a IBM Database 2.
|
630 |
0 |
7 |
|a IBM Database 2.
|2 blmlsh
|
630 |
0 |
7 |
|a IBM Database 2.
|2 fast
|0 (OCoLC)fst01367762
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Database management.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Bases de données
|x Gestion.
|
650 |
|
7 |
|a Database security.
|2 blmlsh
|
650 |
|
7 |
|a Database management.
|2 blmlsh
|
650 |
|
7 |
|a Database management.
|2 fast
|0 (OCoLC)fst00888037
|
650 |
|
7 |
|a Database security.
|2 fast
|0 (OCoLC)fst00888063
|
700 |
1 |
|
|a Bond, Rebecca,
|d 1950-
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0131345907/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|