Cargando…

Understanding DB2 9 security /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bond, Rebecca, 1950-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : IBM Press, 2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Ch. 1. regulatory environment
  • Ch. 2. DB2 security
  • the starting point
  • Ch. 3. Understanding identification and authentication
  • the first line of defense
  • Ch. 4. Securing DB2 on Windows
  • Ch. 5. Authorization
  • authority and privileges
  • Ch. 6. Label based access control
  • Ch. 7. Encryption (cryptography) in DB2
  • Ch. 8. Ready, set, implement?
  • Ch. 9. Database auditing and intrusion detection
  • Ch. 10. SSH for data-partitioning on UNIX platforms
  • Ch. 11. Database security
  • keeping it current
  • Ch. 12. Final thoughts : security
  • the human factor
  • App. A. Independent security packages
  • App. B. Kerberos
  • App. C. DB2 audit scope record layouts
  • App. D. DB2 audit
  • additional documentation
  • App. E. Security considerations for DB2
  • App. F. Glossary of authorization ID
  • App. G. LBAC-related SYSCAT views
  • App. H. Security plug-in return codes
  • App. I. Detailed implementation for the case study in chapter 3.