IBM i Security Administration and Compliance

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book IBM i Security Administration and Compliance by Carol Woodbury, Mc Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Carol Woodbury ISBN: 9781583477311
Publisher: Mc Press Publication: May 1, 2012
Imprint: Mc Press Language: English
Author: Carol Woodbury
ISBN: 9781583477311
Publisher: Mc Press
Publication: May 1, 2012
Imprint: Mc Press
Language: English

Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security officers, compliance officers, and auditors, the resources available in this book help protect systems from unauthorized activities and unplanned events.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security officers, compliance officers, and auditors, the resources available in this book help protect systems from unauthorized activities and unplanned events.

More books from Mc Press

Cover of the book Identity Management: A Primer by Carol Woodbury
Cover of the book SOA for the Business Developer by Carol Woodbury
Cover of the book The IBM i Programmer's Guide to PHP by Carol Woodbury
Cover of the book IBM Mainframe Security by Carol Woodbury
Cover of the book IBM i5/iSeries Primer by Carol Woodbury
Cover of the book DB2 10 for z/OS by Carol Woodbury
Cover of the book Fundamentals of Technology Project Management by Carol Woodbury
Cover of the book DB2 9 Fundamentals by Carol Woodbury
Cover of the book An Introduction to IBM Rational Application Developer by Carol Woodbury
Cover of the book DB2 9 for Developers by Carol Woodbury
Cover of the book DB2 9.7 for Linux, UNIX, and Windows Database Administration by Carol Woodbury
Cover of the book The Programmer's Guide to iSeries Navigator by Carol Woodbury
Cover of the book Advanced Java EE Development for Rational Application Developer 7.5 by Carol Woodbury
Cover of the book Understanding AS/400 System Operations by Carol Woodbury
Cover of the book RPG TnT by Carol Woodbury
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy