$ 44.95 $ 49.95
Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5.
While her companion work, IBM i Security Administration and Compliance, Third Edition, provides the foundational description of IBM i security, Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more. Also included are tips for successful implementation and warnings about what might break.
Throughout Mastering IBM i Security, Carol will introduce you to new methods (such as IBM i Services) and interfaces (such as New Navigator) to perform tasks that you would normally address using traditional CL commands. Tasks such as viewing audit journal entries, Authority Collection information, and user profile settings have new and fresh interfaces, making them easier to understand and consume, whether you're new to the system or an expert.
Mastering IBM i Security is an insight into and a guidebook for the methods and techniques Carol uses to help her clients successfully achieve their IBM i security goals.
Upon completion of this book, you will be able to/you will:
Carol Woodbury is President and CTO at DXR Security, a company dedicated to helping organizations improve the security of their IBM i Systems- one step at a time. Previously, she was Vice President of Global Security Services for HelpSystems and President of SkyView Partners, a firm that specialized in security services and security administration and compliance software before it was acquired by HelpSystems. Carol's foundation of security experience comes from her 16 years with IBM in Rochester, Minnesota, where she served for 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During that time, Carol provided security architecture and design consultations with IBM Business Partners and larger AS/400 customers.
Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security issues. She has authored six books on IBM i security. Carol holds the CISSP, CRISC, and PCIP security certifications and has been named an IBM Champion since 2018.
|July 29, 2022
|Paperback or eBook
|7 x 9 inches
$ 85.95 $ 95.95
Product Look Inside the Book Author Bio Specifications Since its original publication, Programming in RPG IV has given thousands of students and professionals a strong foundation in the essentials...
$ 71.95 $ 79.95
Product Look Inside the Book Author Bio Specifications You may be familiar with SQL, the IBM DB2 for i data-access language. But you might not know that you can...
$ 53.95 $ 59.95
Product Look Inside the Book Author Bio Specifications Traditional fixed-format RPG programmers everywhere are embracing the increased productivity, better readability, and easier program maintenance that comes with the free-format...
$ 71.95 $ 79.95
Product Look Inside the Book Author Bio Specifications Kevin Vandever's Subfiles in RPG IV (MC Press, 2000) offered easy-to-understand explanations of subfile concepts plus a bounty of practical examples,...