Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
This books material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. Youll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.
Coverage includes*Establishing effective security processes, teams, plans, and policies
*Implementing identification and authentication controls, your first lines of defense
*DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
*Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
*Encrypting DB2 connections, data in flight, and data on disk: step-by-step guidance
*Auditing and intrusion detection: crucial technical implementation details
*Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
*Staying current with the latest DB2 security patches and fixes
http://rapidshare.com/files/54680881/0131345907.zip
本书由 DB2 安全部署专家及 IBM DB2 开发团队编写,全面介绍了如何保护 DB2 数据库并利用其强大的新安全特性。内容包括建立有效的安全流程、实施身份验证控制、使用基于标签的访问控制、加密数据等。
279

被折叠的 条评论
为什么被折叠?



