Please note this is a Short Discount publication. Written by a regular user and auditor of the AS400 a this manual is aimed at computer auditors and IT security personnel. The objectives of this manual are to provide a comprehensive and practical guide to the security aspects of the AS400. The manual contains stepabyastep coverage of the security features that IBM have built into each AS400 into the security structure of the company, it will help the user check the adequacy and effectiveness of the organizations current security strategy. The manual is completely up to date and includes the latest enhancements to security incorporated into Version 2 Releases 1 and 2 of the operating systems. Commencing with an overview of AS400 hardware, software and application security, the manual details security features and the procedural controls necessary to overcome or minimize their associated risks. Access methods are outlined, in particular password controls; and the procedures for saving and restoring changes to security settings are described. The management issues of security administration for the system are discussed, looking at the basics of establishing and maintaining security. This is followed by a section on performance management and monitoring, with considerations of how the overhead security imposes on the performance of the system may be reduced without compromising controls. The manual concludes detailing audit and the use of audit of an AS400.Please note this is a Short Discount publication. Written by a regular user and auditor of the AS400 a this manual is aimed at computer auditors and IT security personnel.
|Title||:||AS400 Security, Audit, and Control|
|Author||:||Keith C. Lester|
|Publisher||:||Elsevier Science Limited - 1993|