IBM i & i5/OS Security & Compliance: A Practical Guide

Read * IBM i & i5/OS Security & Compliance: A Practical Guide PDF by * Carol Woodbury eBook or Kindle ePUB Online free. IBM i & i5/OS Security & Compliance: A Practical Guide Brian Hole said IBM i & i5/OS Security & Compliance is the Leatherman of guides to security for this platform.. This book successfully combines and clearly presents the informational needs of CIOs, CISOs, new users, auditors, and expert administrators.Right from the first page this book highlights the basic security principles of Confidentiality, Integrity, and Availability and carries that message through to the end. Carol Woodbury uses great real world examples to relate security situations to

IBM i & i5/OS Security & Compliance: A Practical Guide

Author :
Rating : 4.33 (680 Votes)
Asin : 1583041249
Format Type : paperback
Number of Pages : 336 Pages
Publish Date : 2014-03-26
Language : English

DESCRIPTION:

Brian Hole said IBM i & i5/OS Security & Compliance is the Leatherman of guides to security for this platform.. This book successfully combines and clearly presents the informational needs of CIOs, CISOs, new users, auditors, and expert administrators.Right from the first page this book highlights the basic security principles of Confidentiality, Integrity, and Availability and carries that message through to the end. Carol Woodbury uses great real world examples to relate security situations to simply understood everyday situations.Amazingl. Go Carol! Anne Lucas Carol is tops as an expert in security! She is the personification of integrity! And, she is an awesome lady! God bless you, Carol, as people use this book to protect their businesses. Anne Lucas

She is also an award-winning writer and serves as a technical expert on security topics for numerous publications. Carol has worked in the field of security since 1990. . Carol is an award-winning speaker who speaks around the world on the topic of security. She worked for IBM in Rochester, Minnesota, for 16 years, the last 10 of which were spent as team leader of the OS/400 security development team and

New chapters address compliance requirements for IBM i, implementing role-based access (RBAC), implementing object-level security, and creating a security incident response plan. Contents Chapter 1: Security The Real Reason You re Reading This Book Chapter 2: Policies and Procedures Chapter 3: Security at the System Level Chapter 4: The Facts About User Profiles Chapter 5: Service Tools Security Chapter 6: Object-Level Security Chapter 7: Security Considerations for the IFS Chapter 8: Securing Your Printed Output Chapter 9: Encryption Chapter 10: Connecting to the System Chapter 11: Internet Security Chapter 12: Evaluating Applications Current Implementations and Designing New Ones Chapter 13: Role-based Access (RBAC) Chapter 14: Role-based Access for IT Chapter 15: Auditing Chapter 16: Implementing Object-Level Security Chapter 17: Maintaining Compliance Chapter 18: Preparing for the Worst: Creating a Security Incident Response Plan Chapter 19: Creating a Security Awareness Program. Security consultant Carol Woodbury takes her extensive experience designing and implementing security on IBM systems and makes it relevant for today s world. Carol Woodbury s methodology for

She worked for IBM in Rochester, Minnesota, for 16 years, the last 10 of which were spent as team leader of the OS/400 security development team and chief engineering manager for AS/400 security. . She is also an award-winning writer and serves as a technical expert on security topics for numerous publications. About the Author Carol Woodbury is president of SkyView Partners, Inc., a firm she co-founded in 2002 that specializes in security policy compliance software and remediation services. Carol is an award-winning speaker who speaks around the world on the topic of security. Carol has worked in the field of security since 1990

OTHER BOOK COLLECTION