Understanding DB2 9 security /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
IBM Press,
2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Ch. 1. regulatory environment
- Ch. 2. DB2 security
- the starting point
- Ch. 3. Understanding identification and authentication
- the first line of defense
- Ch. 4. Securing DB2 on Windows
- Ch. 5. Authorization
- authority and privileges
- Ch. 6. Label based access control
- Ch. 7. Encryption (cryptography) in DB2
- Ch. 8. Ready, set, implement?
- Ch. 9. Database auditing and intrusion detection
- Ch. 10. SSH for data-partitioning on UNIX platforms
- Ch. 11. Database security
- keeping it current
- Ch. 12. Final thoughts : security
- the human factor
- App. A. Independent security packages
- App. B. Kerberos
- App. C. DB2 audit scope record layouts
- App. D. DB2 audit
- additional documentation
- App. E. Security considerations for DB2
- App. F. Glossary of authorization ID
- App. G. LBAC-related SYSCAT views
- App. H. Security plug-in return codes
- App. I. Detailed implementation for the case study in chapter 3.