Mastering IBM i Security: A Modern Step-by-Step Guide

Author:   Carol Woodbury ,  Victoria Mack
Publisher:   MC Press, LLC
ISBN:  

9781583479001


Pages:   184
Publication Date:   01 August 2022
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $131.87 Quantity:  
Add to Cart

Share |

Mastering IBM i Security: A Modern Step-by-Step Guide


Add your own review!

Overview

Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5. Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more.

Full Product Details

Author:   Carol Woodbury ,  Victoria Mack
Publisher:   MC Press, LLC
Imprint:   MC Press, LLC
ISBN:  

9781583479001


ISBN 10:   1583479007
Pages:   184
Publication Date:   01 August 2022
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Acknowledgements Introduction Chapter 1: Technology Overview Chapter 2: System Values Chapter 3: Moving to a Higher Security Level Chapter 4: Moving to a Higher Password Level Chapter 5: User Profiles Chapter 6: Using Authority Collection to Reduce Users' Authority Chapter 7: Object Authorities Chapter 8: Adopted Authority Chapter 9: Successfully Securing Objects by Using Authority Collection, IBM i Services, and Auditing Chapter 10: Tips for Securing the IFS and Avoiding Malware Chapter 11: Implementing Function Usage (Application Administration) Chapter 12: Securing the Connection to IBM i Chapter 13: Automating Your Analysis Chapter 14: A Little Bit of Everything

Reviews

Author Information

Carol Woodbury is President and CTO at DXR Security, a company dedicated to helping organizations improve the security of their IBM i Systems - one step at a time. Previously, she was Vice President of Global Security Services for HelpSystems and President of SkyView Partners, a firm that specialized in security services and security administration and compliance software before it was acquired by HelpSystems. Victoria Mack has been the Executive Editor of MC Press Online for the past 25 years.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List