|
|
|||
|
||||
OverviewMastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5. Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more. Full Product DetailsAuthor: Carol Woodbury , Victoria MackPublisher: MC Press, LLC Imprint: MC Press, LLC ISBN: 9781583479001ISBN 10: 1583479007 Pages: 184 Publication Date: 01 August 2022 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsAcknowledgements Introduction Chapter 1: Technology Overview Chapter 2: System Values Chapter 3: Moving to a Higher Security Level Chapter 4: Moving to a Higher Password Level Chapter 5: User Profiles Chapter 6: Using Authority Collection to Reduce Users' Authority Chapter 7: Object Authorities Chapter 8: Adopted Authority Chapter 9: Successfully Securing Objects by Using Authority Collection, IBM i Services, and Auditing Chapter 10: Tips for Securing the IFS and Avoiding Malware Chapter 11: Implementing Function Usage (Application Administration) Chapter 12: Securing the Connection to IBM i Chapter 13: Automating Your Analysis Chapter 14: A Little Bit of EverythingReviewsAuthor InformationCarol Woodbury is President and CTO at DXR Security, a company dedicated to helping organizations improve the security of their IBM i Systems - one step at a time. Previously, she was Vice President of Global Security Services for HelpSystems and President of SkyView Partners, a firm that specialized in security services and security administration and compliance software before it was acquired by HelpSystems. Victoria Mack has been the Executive Editor of MC Press Online for the past 25 years. Tab Content 6Author Website:Countries AvailableAll regions |