Condition - Very Good
The item shows wear from consistent use, but it remains in good condition and functions properly. Item may arrive with damaged packaging or be repackaged. It may be marked, have identifying markings on it, or have minor cosmetic damage. It may also be missing some parts/accessories or bundled items.
IBM i Security Administration and Compliance
- Gain the knowledge you need to secure your IBM i system
- Discover security best practices
- Receive a comprehensive introduction to role-based access
- Learn a methodology for implementing IBM i object-level security
- Understand the issues your organization needs to address for audit and compliance requirements
Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in a clear, jargon-free style, this book covers topics such as system security levels, user profiles, service tools, encryption, auditing, compliance, and incident response. The author's methodology for implementing security is described in great detail, focusing on compliance with stated policies and procedures within an organization. Useful for security and system administrators, security officers, compliance officers, and auditors, the resources available in this book help protect systems from unauthorized activities and unplanned events.