Serving as a guide to securing DB2, this book provides DBAs and their managers with security information. It offers practical guidance on post-implementation auditing, and shows how to systematically maintain security on an ongoing basis. Its coverage includes establishing effective security processes, teams, plans, and policies.
Bio de l'auteur
Sommaire / contenu