$ 57.56 $ 71.95
Welcome to the long-awaited update to IBM i Security Administration and Compliance—the definitive IBM i security reference. In this Second Edition, IBM i security expert Carol Woodbury tells you everything you need to know about IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system.
In this book, you will delve into topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response—and learn about the latest enhancements to IBM i security in V7R2 and V7R3. Carol describes her methodology for implementing security in great detail, focusing on compliance with stated policies and procedures within an organization. She also provides updated recommendations to align with current best practices and to address today’s security threats.
Useful for security and system administrators, security officers, compliance officers, and auditors, the resources available in this book help organizations reduce the risk to the data residing on their IBM i systems and help protect systems from unauthorized access and modification.
Upon completion of this book, you will:
|Author Name:||Carol Woodbury|
|Publication Date:||May 11, 2016|
|Product Dimensions:||7 x .89 x 9 inches|
|Shipping Weight:||1.5 pounds|
$ 12.00 $ 79.95
Product Look Inside the Book Author Bio Specifications Kevin Vandever's Subfiles in RPG IV (MC Press, 2000) offered easy-to-understand explanations of subfile concepts plus a bounty of practical examples,...
$ 28.00 $ 79.95
Product Look Inside the Book Author Bio Specifications If you still write RPG code as you did 20 years ago, or if you have RPG ILE on your resume...