O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Ready, Set, Implement?

Shopping for a wardrobe one item at a time means that at some point, you have to put all the pieces together to achieve an outfit. Working through the pieces of DB2 security one step at a time means that, at some point, you need to step back and form the foundation that achieves the secure environment.

First Words: Just Start…but Where?

Sometimes, just starting a task is the hardest part. Where should you begin the task of a secure DB2 implementation?

You might be wondering why this chapter is not the first one in the book. But, without some foundational knowledge about the DB2 product and some understanding of how to create policies and procedures, “putting it all together” is not a logical conduit to creating ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required