Articles & Content

Archives

Best Practices in DB2 UDB Security (C12)

Topic: DB2 for z/OS

Subtopic: 2005



DATE: 2005-5-25 (12:30 PM - 01:40 PM)
SPEAKERS: Roger Miller (IBM Silicon Valley Lab)

This discussion will show practices for security and discuss how you can make improvements. The discussion includes various security objectives, from very tight system security, to more flexible, but less strong application security techniques or web techniques. Choices and guidelines will be our primary points.

EXP. LEVEL: Intermediate

OBJECTIVES:

Security objectives

Guidelines for high security

Techniques for application security

Best practices and improvements

Checking and auditing



Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.