Have you been cruising the web of late looking for a book to read before taking one of the DB2 LUW certification test? If you have, one of the names that I am sure you came across was Roger E. Sanders. And that short intro begins our second of what I hope will be many profiles of DB2 authors…… Continue reading »
Have you ever been listening to a presenter at a conference or user group meeting thinking to yourself “I could do that”. Well, here’s your chance to let the world (or at least the Db2 community) that YES you really can that. Remember, you’ve already done the hard part, you know (learned) DB2. telling your fiends about what you know is the easy half…… Continue reading »
Yup, you read that correctly. Today’s post deals with DB2 LUW security. The good news is that I’m not the author. I am (we are) very fortunate to have a real DB2 LUW security expert willing to tackle the topic for me.
Today’s blog entry is written by Rebecca Bond, CISSP. If you are not familiar with CISSP it stands for Certified Information Systems Security Professional . Rebecca doesn’t need the extra letters after her name though. She is recognized as the security expert by her peers. She’s also the author of ”Understanding DB2 9 Security” published by IBM Press (I have to admit, even though it’s LUW, this is a book I own). If that all isn’t enough to dazzle you, Rebecca is an IBM Information Champion. You can learn more about Rebecca and her consulting practice at her website http://www.securedb2.com/ ……. Continue reading »
As the title asked, “Have you read a good Redbook lately?” If you have, did you tell us (IBM)…. On every Redbook download page, there is a spot in the right hand column, just a little bit under the logo where you can rate the a Redbook and enter your comments. Just click on the link’s label “Rate this book” (or maybe it might say “Rate this draft”, “Rate this paper”, etc…)….. Continue reading »