This tip brainstorms a few approaches for automatically testing various aspects of DB2 for i code.
Written by Michael Sansoterra
In the first tip, I showed various ways to test DB2 functions, procedure results, and triggers for logic accuracy and security. However, the tip never covered how these tests, once written, are to be processed. In particular, questions such as these need further discussion:
Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.
In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform. From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.
Don’t miss the first reveal of more than a decade’s worth of research on the security configurations of IBM-i based servers and the successes and failures of organizations that run critical applications on them.
Over the past 11 years, PowerTech has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls. Along with the results, this webinar provides a review of six configuration categories:
Network-initiated commands and data access
Server-level security controls
Profile and password settings
Public accessibility to corporate data
System event auditing
Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures–including some that are often missed by professional auditors!
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a On-Demand Webcast you would like to list? click here or call (208) 629-7275 for information.
The March 2014 disappearance of Malaysian Airlines Flight 370 has renewed old concerns about the security of aircraft with embedded systems, such as the Boeing 777. While the exact causes of the plane’s demise have not been determined yet, security experts have taken the opportunity to point out that cyberattacks could exploit the features of advanced airliners and lead to similar incidents in the future.