
- 449 pages
- English
- PDF
- Available on iOS & Android
IBM i Security Administration and Compliance
About this book
Master IBM i security with this comprehensive guide to administration and compliance.
In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything you need to know about IBM i security. Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system.
Learn how to protect sensitive data, understand and mitigate security risks, and achieve compliance with security regulations. This book is for IBM i system administrators, security officers, IT professionals, and auditors who want to ensure the security and integrity of their IBM i systems.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front Cover
- Title Page
- Copyright
- Dedication
- Acknowledgments
- Contents
- Chapter 1: Security—The Reasons You’re Reading This Book
- Chapter 2: Policies and Procedures
- Chapter 3: Security at the System Level
- Chapter 4: The Facts About User Profiles
- Chapter 5: Service Tools Security
- Chapter 6: Object-Level Security
- Chapter 7: Security Considerations for the IFS
- Chapter 8: Securing Your Printed Output
- Chapter 9: Encryption
- Chapter 10: Connecting to the System
- Chapter 11: Internet Security
- Chapter 12: Evaluating Applications’ Current Implementations and Designing New Ones
- Chapter 13: Role-Based Access
- Chapter 14: Role-Based Access for IT
- Chapter 15: Auditing
- Chapter 16: Implementing Object-Level Security
- Chapter 17: Security Administration
- Chapter 18: Maintaining Compliance
- Chapter 19: Preparing for the Worst: Creating a Security Incident Response Plan
- Chapter 20: Creating a Security Awareness Program
- Index