$ 14.95 $ 69.95
In this practical and highly readable guide--a V7 update to her acclaimed IBM i & i5/OS Security & Compliance book--security expert Carol Woodbury explains IBM i security and how it functions within IBM i systems. Carol explains the importance of developing a security policy and details how to implement and maintain a compliant system, sharing insights and recommendations based on her extensive experience designing and implementing security on IBM systems.
Security levels, user profiles, service tools, encryption, auditing, compliance, security administration, and incident response are among the topics covered. Internet and network security, as well as security considerations for IT personnel, vendors, and consultants, are discussed, and a full explanation of the security audit journal is provided. An all-new chapter focuses on security administration, highlighting areas that need attention and explaining how to manage them effectively.
Carol also shares her methodology for successfully implementing an object-level security project, detailing the process of determining a system's current security settings, default access requirements, process access, and rollout of new application security models.
Whether you're a new system administrator who needs to learn the basics of IBM i security, a seasoned veteran whose organization is required to be in compliance with certain laws or regulations, a security administrator who wants to understand how to more efficiently manage security on IBM i, or an auditor assigned to evaluate an IBM i shop, this book contains essential explanations that enable you to succeed. Every IBM i security and system administrator, security officer, compliance officer, and auditor will want to take advantage of the resources in this book to help protect their systems from unauthorized activities and unplanned events.
With IBM i Security Administration and Compliance, you will:
|Author Name:||Carol Woodbury|
|Publication Date:||May 25, 2012|
|Product Dimensions:||7 x 1 x 9 inches|
|Shipping Weight:||1.1 pounds|
$ 39.95 $ 71.95
Product Look Inside the Book Author Bio Specifications Welcome to the long-awaited update to IBM i Security Administration and Compliance—the definitive IBM i security reference. In this Second Edition,...
$ 6.95 $ 64.95
Product Look Inside the Book Author Bio Specifications Written to address the special disaster recovery planning issues of System i, this book is your step-by-step guide to developing an...
$ 3.95 $ 49.95
Product Look Inside the Book Author Bio Specifications Explosive growth in the demand for IT computing infrastructure resources has put the global IT data centers that host this infrastructure...
$ 19.95 $ 59.95
Product Look Inside the Book Author Bio Specifications Mainframes are the backbone of most large IT organizations' and many medium-sized companies, too. Their security cannot be left to chance....