$ 41.95 $ 49.95
Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5.
While her companion work, IBM i Security Administration and Compliance, Third Edition, provides the foundational description of IBM i security, Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more. Also included are tips for successful implementation and warnings about what might break.
Throughout Mastering IBM i Security, Carol will introduce you to new methods (such as IBM i Services) and interfaces (such as New Navigator) to perform tasks that you would normally address using traditional CL commands. Tasks such as viewing audit journal entries, Authority Collection information, and user profile settings have new and fresh interfaces, making them easier to understand and consume, whether you're new to the system or an expert.
Mastering IBM i Security is an insight into and a guidebook for the methods and techniques Carol uses to help her clients successfully achieve their IBM i security goals.
Upon completion of this book, you will be able to/you will:
Carol WoodburyÃƒÆ’Ã†â€™Ãƒâ€šÃ¢â‚¬Å¡ÃƒÆ’Ã¢â‚¬Å¡Ãƒâ€šÃ‚Â is President and CTO at DXR Security, a company dedicated to helping organizations improve the security of their IBM i Systems- one step at a time. Previously, she was Vice President of Global Security Services for HelpSystems and President of SkyView Partners, a firm that specialized in security services and security administration and compliance software before it was acquired by HelpSystems. Carol's foundation of security experience comes from her 16 years with IBM in Rochester, Minnesota, where she served for 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During that time, Carol provided security architecture and design consultations with IBM Business Partners and larger AS/400 customers.
Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security issues. She has authored six books on IBM i security. Carol holds the CISSP, CRISC, and PCIP security certifications and has been named an IBM Champion since 2018.
|Author Name:||Carol Woodbury|
|Publication Date:||July 29, 2022|
|Format:||Paperback or eBook|
|Product Dimensions:||7 x 9 inches|
|Shipping Weight:||#.# pounds|
$ 59.95 $ 71.95
Product Look Inside the Book Author Bio Specifications In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know...
$ 49.95 $ 64.95
Product Look Inside the Book Author Bio Specifications Written to address the special disaster recovery planning issues of System i, this book is your step-by-step guide to developing an...
$ 25.45 $ 59.95
Product Look Inside the Book Author Bio Specifications Mainframes are the backbone of most large IT organizations' and many medium-sized companies, too. Their security cannot be left to chance....
$ 25.45 $ 49.95
Product Look Inside the Book Author Bio Specifications For business managers and chief information officers (CIOs), the ability to manage identity data of employees, contractors, business partners, and customers...