Articles & Content
Topic: 2005 NA
Subtopic: DB2 for z/OS
DATE: 2005-5-25 (12:30 PM - 01:40 PM)
SPEAKERS: Roger Miller (IBM Silicon Valley Lab)
This discussion will show practices for security and discuss how you can make improvements. The discussion includes various security objectives, from very tight system security, to more flexible, but less strong application security techniques or web techniques. Choices and guidelines will be our primary points.
EXP. LEVEL: Intermediate
Guidelines for high security
Techniques for application security
Best practices and improvements
Checking and auditing
This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!Click to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.