Experts' Guide to OS/400 & I5/OS Security

Experts' Guide to OS/400 & I5/OS Security
ISBN-10
158304096X
ISBN-13
9781583040966
Category
Computer security
Pages
516
Language
English
Published
2004
Publisher
System iNetwork
Authors
Carol Woodbury, Patrick Botz

Description

For a useful example of a UDF that performs authority checking for an application , go to http : // www-1.ibm.com/servers/eserver/iseries/db2 db2code.htm . What About SQL Tables and Views ? You may have picked up this fact early in the ...

Similar books

  • IBM i and I5/OS Security and Compliance: A Practical Guide
    By Carol Woodbury

    This information is presented in a way that lets even non-security professionals understand and apply the concepts.This book is a must-read for any auditor, system administrator, security officer, or compliance officer who works with the ...

  • IBM i Security Administration and Compliance
    By Carol Woodbury

    Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems.

  • IBM System i Security: Protecting i5/OS Data with Encryption
    By IBM Redbooks, Yessong Johng, Beth Hagemeister

    Understanding these is important to follow the rest of the book. If you are already familiar with the general concepts of cryptography and the data encryption aspect of it, you may skip this part.

  • Security Guide for IBM i V6.1
    By IBM Redbooks, Jim Cook, Juan Carlos Cantalupo

    This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM.

  • IBM I Security Administration and Compliance
    By Carol Woodbury

    Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system.

  • IBM i Program Conversion: Getting Ready for 6.1 and Beyond
    By IBM Redbooks, Mike Charlton, Deb Landon

    The title of this second edition has been slightly modified to IBM i Program Conversion: Getting Ready for 6.1 and Beyond, REDP-4293-01, to reflect the new naming conventions for IBM i.

  • Books In Print 2004-2005
    By ed, Ed Bowker Staff, Staff Bowker

    Books In Print 2004-2005

  • Book Review Index

    Every 3rd issue is a quarterly cumulation.

  • IBM Technology for Java Virtual Machine in IBM i5/OS
    By IBM Redbooks, Aleksandr Nartovich, Adam Smye-Rumsby

    Efficient SQL coding techniques, such as only accessing the data you require, are also essential. For examples, refer to section 9.2.4 of the IBM Redbook titled Maximum Performance with WebSphere Application Server V5.1 on iSeries, ...

  • IBM i 6.1 Technical Overview
    By IBM Redbooks, Jim Cook, Ahmed Mansour

    The project that produced this publication was managed by: Scott Vetter, PMP IBM Austin Thanks to the following people for their contributions to this project: Lindsay S Avers, Hernando Bedoya, David Bhaskaran, Adam T Clark, ...