In this updated Third Edition of IBM i Security Administration and Compliance, gain expert insights from Carol Woodbury on mastering IBM i security. Designed for security officers, administrators, and auditors, this resource provides clear explanations and practical examples for implementing and auditing IBM i security features.
- Understand security best practices for IBM i systems.
- Implement and audit security features effectively.
- Utilize the Authority Collection feature for enhanced security.
- Navigate security-related SQL views and SIEM integration.
- Protect your systems and data from unauthorized access and modification.
Reduce risk and ensure business continuity with proven techniques for safeguarding your IBM i environment.
