Understanding DB2 9 Security and over one million other books are available for Amazon Kindle. Learn more

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 
Have one to sell? Sell yours here
Start reading Understanding DB2 9 Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Understanding DB2 9 Security [Hardcover]

by Rebecca Bond, Kevin Yeung-Kuen See, Carmen Ka Man Wong, Yuk-Kuen Henry Chan
4.2 out of 5 stars  See all reviews (4 customer reviews)


Available from these sellers.


Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Kindle Edition $22.99  
Hardcover --  
Paperback $59.99  
Sell Us Your Books
Get up to 80% back when you sell us your books, even if you didn't buy them at Amazon. Learn more

Book Description

December 23, 2006 0131345907 978-0131345904 1

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

 

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

 

Coverage includes

  • Establishing effective security processes, teams, plans, and policies
  • Implementing identification and authentication controls, your first lines of defense
  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
  • Auditing and intrusion detection: crucial technical implementation details
  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
  • Staying current with the latest DB2 security patches and fixes

Customers Who Bought This Item Also Bought


Editorial Reviews

About the Author

Rebecca Bond is an IBM recognized DB2 SME with extensive experience in security, and a background in finance, healthcare, and government technology consulting. She holds numerous IBM certifications, including IBM Certified Advanced Database Administrator.

 

Kevin Yeung-Kuen See, CISSP, software developer at the IBM Toronto Laboratory, has served on the DB2 Security Development team. He is a IBM DB2 Certified Solutions Expert.

 

Carmen Ka Man Wong, staff software developer for IBM, recently joined the DB2 Continuing Engineering team, where she focuses on the DB2 Process Model. She authored the developerWorks series DB2 Label-Based Access Control.

 

Yuk-Kuen Henry Chan, advisory software developer at the IBM Toronto Lab, is a member of the DB2 Continuing Engineering team, and former member of the DB2 Security Development team. He is an IBM Certified Solutions Expert.


Product Details

  • Hardcover: 432 pages
  • Publisher: IBM Press; 1 edition (December 23, 2006)
  • Language: English
  • ISBN-10: 0131345907
  • ISBN-13: 978-0131345904
  • Product Dimensions: 9.5 x 7.2 x 1.3 inches
  • Shipping Weight: 2.1 pounds
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #2,709,424 in Books (See Top 100 in Books)

Customer Reviews

4.2 out of 5 stars
(4)
4.2 out of 5 stars
Share your thoughts with other customers
Most Helpful Customer Reviews
1 of 1 people found the following review helpful
5.0 out of 5 stars great book January 16, 2007
Format:Hardcover
This is a must read book for DB professionals implementing DB2 9, now or in the future. The book is written in a simple stratight forward and logical manner that makes for very easy reading, yet it provides complete coverage of the topic. The book provides comprehensive technical and managerial information regarding the security of DB2 systems.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars All About DB2 Security March 7, 2008
Format:Hardcover
Understanding DB2 9 Security by Rebecca Bond, et al (IBM Press) offers nice, well-thought-out coverage of DB2 security for DB2 DBAs, developers, and really anyone in need of securing DB2 data. This book offers a nice comprehensive guide to securing DB2 particularly in terms of leveraging the powerful new security features of DB2 9. This book is well-organized and offers in-depth coverage of some perhaps-difficult DB2 security issues such as identification and authentication controls, label based access control (LBAC), encryption ("at rest" and "in flight"), auditing and intrusion detection, using SSH, and managing patches and fixes.

The book is written for users of DB2 on Linux, Unix, and Windows platforms, and not for the z/OS flavor of DB2. But since there are many similar issues, DB2 for z/OS admins will find much to interest them, too.

While you're at it, check out the new IBM Press book Mainframe Basics for Security Professionals: Getting Started with RACF. It is not specifically about database security, but it is interesting for mainframers concerned about security and RACF nonetheless.
Comment | 
Was this review helpful to you?
Format:Hardcover
Understanding DB2 9 Security isn't for the light programmer's library: it's an in-depth, comprehensive guide - the only one - to securing DB2 and harnessing the new features of 9, and comes from a security deployment expert and the IBM DB2 development team itself. As such, college-level holdings strong in advanced computer database and security holdings will find it a top pick, covering everything from security processes and plans to implementing design in the DB2 environment.
Comment | 
Was this review helpful to you?
0 of 1 people found the following review helpful
3.0 out of 5 stars Unexceptional March 8, 2007
Format:Hardcover|Verified Purchase
I thought from the qualifications of the writers that this would be an excellent book. Instead it falls into the mediocre category, rehashing in poorly editted language information that is presented better elsewhere. The clarity of the "explanations" of core concepts leaves much to be desired (e.g., Kerberos) and is dreadfully short on usefulness (Okay, how do you get an AIX version of DB2 to authenticate using Active Directory?). Maybe I just wanted too much: I mean, it's an okay book, just not great.
Comment | 
Was this review helpful to you?
Search Customer Reviews
Only search this product's reviews
ARRAY(0xa2819a20)

Citations (learn more)
This book cites 5 books:



Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category