From the Back Cover
- Establishing effective security processes, teams, plans, and policies
- Implementing identification and authentication controls, your first lines of defense
- DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
- Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
- Encrypting DB2 connections, data "in flight," and data on disk: step-by-step guidance
- Auditing and intrusion detection: crucial technical implementation details
- Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
- Staying current with the latest DB2 security patches and fixes
About the Author
Rebecca Bond is an IBM recognized DB2 SME with extensive experience in security, and a background in finance, healthcare, and government technology consulting. She holds numerous IBM certifications, including IBM Certified Advanced Database Administrator.
Kevin Yeung-Kuen See, CISSP, software developer at the IBM Toronto Laboratory, has served on the DB2 Security Development team. He is a IBM DB2 Certified Solutions Expert.
Carmen Ka Man Wong, staff software developer for IBM, recently joined the DB2 Continuing Engineering team, where she focuses on the DB2 Process Model. She authored the developerWorks series DB2 Label-Based Access Control.
Yuk-Kuen Henry Chan, advisory software developer at the IBM Toronto Lab, is a member of the DB2 Continuing Engineering team, and former member of the DB2 Security Development team. He is an IBM Certified Solutions Expert.