The Leading Educational Resource for IT Professionals

IBM i Security Administration and Compliance

Carol Woodbury


Continue Shopping or Checkout

  • In this practical and highly readable guide--a V7 update to her acclaimed IBM i & i5/OS Security & Compliance book--security expert Carol Woodbury explains IBM i security and how it functions within IBM i systems. Carol explains the importance of developing a security policy and details how to implement and maintain a compliant system, sharing insights and recommendations based on her extensive experience designing and implementing security on IBM systems.

    Security levels, user profiles, service tools, encryption, auditing, compliance, security administration, and incident response are among the topics covered. Internet and network security, as well as security considerations for IT personnel, vendors, and consultants, are discussed, and a full explanation of the security audit journal is provided. An all-new chapter focuses on security administration, highlighting areas that need attention and explaining how to manage them effectively.

    Carol also shares her methodology for successfully implementing an object-level security project, detailing the process of determining a system's current security settings, default access requirements, process access, and rollout of new application security models.

    Whether you're a new system administrator who needs to learn the basics of IBM i security, a seasoned veteran whose organization is required to be in compliance with certain laws or regulations, a security administrator who wants to understand how to more efficiently manage security on IBM i, or an auditor assigned to evaluate an IBM i shop, this book contains essential explanations that enable you to succeed. Every IBM i security and system administrator, security officer, compliance officer, and auditor will want to take advantage of the resources in this book to help protect their systems from unauthorized activities and unplanned events.

    With IBM i Security Administration and Compliance, you will:

    • Gain the knowledge you need to secure your IBM i system
    • Discover security best practices
    • Receive a comprehensive introduction to role-based access
    • Learn a methodology for implementing IBM i object-level security
    • Understand the issues your organization needs to address for audit and compliance requirements
    • Learn techniques for more efficiently and effectively administering security
    • Learn about helpful system tools and commands for managing IBM i security
  • Carol Woodbury is president of SkyView Partners, Inc., a firm she co-founded in 2002 that specializes in security policy compliance software and remediation services. Prior to forming SkyView Partners, Carol worked for IBM in Rochester, Minnesota, serving for more than 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During this time, Carol provided security architecture and design consultations with IBM Business Partners and large AS/400 customers.

    Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i and i5/OS security issues. She has authored three previous books on IBM i and i5/OS security. She also serves as a technical expert on security for numerous publications.

    Carol is Certified in Risk Management and Information Systems Control (CRISC). You can follow Carol on Twitter @carolwoodbury.
  • Item Number: 5129
    Author Name: Carol Woodbury
    Publication Date: May 25, 2012
    Edition: First
    Pages: 368
    ISBN-10: 1583473734
    ISBN-13: 9781583473733
    Format: Paperback
    Product Dimensions: 7 x 1 x 9 inches
    Shipping Weight: 1.1 pounds
    Language: English

Related Items