$ 59.95 $ 71.95
Welcome to the long-awaited update to IBM i Security Administration and Compliance—the definitive IBM i security reference. In this Second Edition, IBM i security expert Carol Woodbury tells you everything you need to know about IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system.
In this book, you will delve into topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response—and learn about the latest enhancements to IBM i security in V7R2 and V7R3. Carol describes her methodology for implementing security in great detail, focusing on compliance with stated policies and procedures within an organization. She also provides updated recommendations to align with current best practices and to address today’s security threats.
Useful for security and system administrators, security officers, compliance officers, and auditors, the resources available in this book help organizations reduce the risk to the data residing on their IBM i systems and help protect systems from unauthorized access and modification.
Upon completion of this book, you will:
|Author Name:||Carol Woodbury|
|Publication Date:||May 11, 2016|
|Product Dimensions:||7 x .89 x 9 inches|
|Shipping Weight:||1.5 pounds|
$ 11.95 $ 64.95
Product Look Inside the Book Author Bio Specifications Written to address the special disaster recovery planning issues of System i, this book is your step-by-step guide to developing an...
$ 11.95 $ 69.95
Product Look Inside the Book Author Bio Specifications In this practical and highly readable guide--a V7 update to her acclaimed IBM i & i5/OS Security & Compliance book--security expert...
$ 7.95 $ 49.95
Product Look Inside the Book Author Bio Specifications Explosive growth in the demand for IT computing infrastructure resources has put the global IT data centers that host this infrastructure...
$ 11.95 $ 49.95
Product Look Inside the Book Author Bio Specifications For business managers and chief information officers (CIOs), the ability to manage identity data of employees, contractors, business partners, and customers...