did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781583479001

Mastering IBM i Security A Modern Step-by-Step Guide

by ;
  • ISBN13:

    9781583479001

  • ISBN10:

    1583479007

  • Format: Paperback
  • Copyright: 2022-08-01
  • Publisher: MC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $53.28 Save up to $39.23
  • Rent Book $39.17
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5. Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more.

Author Biography

Carol Woodbury is President and CTO at DXR Security, a company dedicated to helping organizations improve the security of their IBM i Systems - one step at a time. Previously, she was Vice President of Global Security Services for HelpSystems and President of SkyView Partners, a firm that specialized in security services and security administration and compliance software before it was acquired by HelpSystems. Victoria Mack has been the Executive Editor of MC Press Online for the past 25 years.

Table of Contents

Acknowledgements Introduction Chapter 1: Technology Overview Chapter 2: System Values Chapter 3: Moving to a Higher Security Level Chapter 4: Moving to a Higher Password Level Chapter 5: User Profiles Chapter 6: Using Authority Collection to Reduce Users’ Authority Chapter 7: Object Authorities Chapter 8: Adopted Authority Chapter 9: Successfully Securing Objects by Using Authority Collection, IBM i Services, and Auditing Chapter 10: Tips for Securing the IFS and Avoiding Malware Chapter 11: Implementing Function Usage (Application Administration) Chapter 12: Securing the Connection to IBM i Chapter 13: Automating Your Analysis Chapter 14: A Little Bit of Everything

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program