Cargando…

Security Functions of IBM DB2 10 for z/OS /

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and pr...

Descripción completa

Detalles Bibliográficos
Autores principales: Bruni, Paolo (Autor), Antonelli, Marcelo (Autor), Baek, Hyun (Autor), Butler, Rick (Autor), Mancill, Ernie (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: IBM Redbooks, 2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1162605963
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 160813s2011 xx o 000 0 eng
040 |a AU@  |b eng  |c AU@  |d UAB  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 0738436038 
020 |z 9780738436036 
024 8 |a SG24795900 
024 8 |a 0738436038 
029 0 |a AU@  |b 000067299408 
035 |a (OCoLC)1162605963 
049 |a UAMI 
100 1 |a Bruni, Paolo,  |e author. 
245 1 0 |a Security Functions of IBM DB2 10 for z/OS /  |c Bruni, Paolo. 
264 1 |b IBM Redbooks,  |c 2011. 
300 |a 1 online resource (456 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators. 
542 |g 2011 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed September 2, 2011) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a IBM Database 2. 
630 0 0 |a z/OS. 
630 0 6 |a IBM Database 2 (Logiciel) 
630 0 6 |a Z/OS (Système d'exploitation des ordinateurs) 
630 0 7 |a IBM Database 2  |2 fast 
630 0 7 |a z/OS  |2 fast 
650 0 |a Database management. 
650 0 |a Database security. 
650 6 |a Bases de données  |x Gestion. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a Database management  |2 fast 
650 7 |a Database security  |2 fast 
700 1 |a Antonelli, Marcelo,  |e author. 
700 1 |a Baek, Hyun,  |e author. 
700 1 |a Butler, Rick,  |e author. 
700 1 |a Mancill, Ernie,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738436038/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP