Start reading Understanding DB2 9 Security on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device

 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Colour:
Image not available
 

Understanding DB2 9 Security: DB2 Information Management Software [Kindle Edition]

Rebecca Bond , Kevin Yeung-Kuen See , Carmen Ka Man Wong , Yuk-Kuen Henry Chan

Print List Price: £36.99
Kindle Price: £29.29 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £7.70 (21%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.

Formats

Amazon Price New from Used from
Kindle Edition £29.29  
Hardcover £30.83  
Paperback £31.65  
Earn a Free Kindle Book
Earn a Free Kindle Book
Buy a Kindle book between now and 31 March and receive a promotional code good for one free Kindle book. Terms and conditions apply. Learn more

Product Description

Product Description

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes

From the Back Cover

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes

Product details

  • Format: Kindle Edition
  • File Size: 7607 KB
  • Print Length: 432 pages
  • Simultaneous Device Usage: Up to 5 simultaneous devices, per publisher limits
  • Publisher: IBM Press; 1 edition (13 Dec. 2006)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B000SEI29E
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Amazon Bestsellers Rank: #1,447,104 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.2 out of 5 stars  4 reviews
1 of 1 people found the following review helpful
5.0 out of 5 stars great book 16 Jan. 2007
By Data Guru - Published on Amazon.com
Format:Hardcover
This is a must read book for DB professionals implementing DB2 9, now or in the future. The book is written in a simple stratight forward and logical manner that makes for very easy reading, yet it provides complete coverage of the topic. The book provides comprehensive technical and managerial information regarding the security of DB2 systems.
4.0 out of 5 stars All About DB2 Security 7 Mar. 2008
By Data Guy - Published on Amazon.com
Format:Hardcover
Understanding DB2 9 Security by Rebecca Bond, et al (IBM Press) offers nice, well-thought-out coverage of DB2 security for DB2 DBAs, developers, and really anyone in need of securing DB2 data. This book offers a nice comprehensive guide to securing DB2 particularly in terms of leveraging the powerful new security features of DB2 9. This book is well-organized and offers in-depth coverage of some perhaps-difficult DB2 security issues such as identification and authentication controls, label based access control (LBAC), encryption ("at rest" and "in flight"), auditing and intrusion detection, using SSH, and managing patches and fixes.

The book is written for users of DB2 on Linux, Unix, and Windows platforms, and not for the z/OS flavor of DB2. But since there are many similar issues, DB2 for z/OS admins will find much to interest them, too.

While you're at it, check out the new IBM Press book Mainframe Basics for Security Professionals: Getting Started with RACF. It is not specifically about database security, but it is interesting for mainframers concerned about security and RACF nonetheless.
5.0 out of 5 stars Covering everything from security processes and plans to implementing design in the DB2 environment. 4 Mar. 2007
By Midwest Book Review - Published on Amazon.com
Format:Hardcover
Understanding DB2 9 Security isn't for the light programmer's library: it's an in-depth, comprehensive guide - the only one - to securing DB2 and harnessing the new features of 9, and comes from a security deployment expert and the IBM DB2 development team itself. As such, college-level holdings strong in advanced computer database and security holdings will find it a top pick, covering everything from security processes and plans to implementing design in the DB2 environment.
0 of 1 people found the following review helpful
3.0 out of 5 stars Unexceptional 8 Mar. 2007
By DataJanitor - Published on Amazon.com
Format:Hardcover|Verified Purchase
I thought from the qualifications of the writers that this would be an excellent book. Instead it falls into the mediocre category, rehashing in poorly editted language information that is presented better elsewhere. The clarity of the "explanations" of core concepts leaves much to be desired (e.g., Kerberos) and is dreadfully short on usefulness (Okay, how do you get an AIX version of DB2 to authenticate using Active Directory?). Maybe I just wanted too much: I mean, it's an okay book, just not great.
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category