IBM DB2 9.7 Advanced Administration Cookbook

IBM DB2 9.7 Advanced Administration Cookbook
Author :
Publisher : Packt Publishing Ltd
Total Pages : 824
Release :
ISBN-10 : 9781849683333
ISBN-13 : 1849683336
Rating : 4/5 (33 Downloads)

Synopsis IBM DB2 9.7 Advanced Administration Cookbook by : Adrian Neagu

This is a practical hands-on book with clear instructions and lot of code examples. It takes a simple approach, guiding you through different architectural topics using realistic sample projects

IBM DB2 9.7 Advanced Application Developer Cookbook

IBM DB2 9.7 Advanced Application Developer Cookbook
Author :
Publisher : Packt Publishing Ltd
Total Pages : 660
Release :
ISBN-10 : 9781849683975
ISBN-13 : 1849683972
Rating : 4/5 (75 Downloads)

Synopsis IBM DB2 9.7 Advanced Application Developer Cookbook by : Sanjay Kumar

This cookbook has recipes written in a simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an IBM DB2 application developer who would like to exploit advanced features provided by DB2 to design and implement high quality applications, then this book is for you. This book assumes you have a basic understanding of the DB2 application development.

Oracle 11g Anti-Hacker's Cookbook

Oracle 11g Anti-Hacker's Cookbook
Author :
Publisher : Packt Publishing Ltd
Total Pages : 456
Release :
ISBN-10 : 9781849685276
ISBN-13 : 1849685274
Rating : 4/5 (76 Downloads)

Synopsis Oracle 11g Anti-Hacker's Cookbook by : Adrian Neagu

This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is for you. This book assumes you have a basic understanding of security concepts.

IBM Db2 11.1 Certification Guide

IBM Db2 11.1 Certification Guide
Author :
Publisher : Packt Publishing Ltd
Total Pages : 474
Release :
ISBN-10 : 9781788627870
ISBN-13 : 1788627873
Rating : 4/5 (70 Downloads)

Synopsis IBM Db2 11.1 Certification Guide by : Mohankumar Saraswatipura

Mastering material for dealing with DBA certification exams Key Features Prepare yourself for the IBM C2090-600 certification exam Cover over 50 Db2 procedures including database design, performance, and security Work through over 150 Q&As to gain confidence on each topic Book Description IBM Db2 is a relational database management system (RDBMS) that helps you store, analyze, and retrieve data efficiently. This comprehensive book is designed to help you master all aspects of IBM Db2 database administration and prepare you to take and pass IBM's Certification Exams C2090-600. Building on years of extensive experience, the authors take you through all areas covered by the test. The book delves deep into each certification topic: Db2 server management, physical design, business rules implementation, activity monitoring, utilities, high availability, and security. IBM Db2 11.1 Certification Guide provides you with more than 150 practice questions and answers, simulating real certification examination questions. Each chapter includes an extensive set of practice questions along with carefully explained answers. This book will not just prepare you for the C2090-600 exam but also help you troubleshoot day-to-day database administration challenges. What you will learn Configure and manage Db2 servers, instances, and databases Implement Db2 BLU Acceleration and a DB2 pureScale environment Create, manage, and alter Db2 database objects Use the partitioning capabilities available within Db2 Enforce constraint checking with the SET INTEGRITY command Utilize the Db2 problem determination (db2pd) and dsmtop tools Configure and manage HADR Understand how to encrypt data in transit and at rest Who this book is for The IBM Db2 11.1 Certification Guide is an excellent choice for database administrators, architects, and application developers who are keen to obtain certification in Db2. Basic understanding of Db2 is expected in order to get the most out of this guide.

IBM PowerHA SystemMirror for AIX Cookbook

IBM PowerHA SystemMirror for AIX Cookbook
Author :
Publisher : IBM Redbooks
Total Pages : 570
Release :
ISBN-10 : 9780738440019
ISBN-13 : 0738440019
Rating : 4/5 (19 Downloads)

Synopsis IBM PowerHA SystemMirror for AIX Cookbook by : Dino Quintero

This IBM® Redbooks® publication can help you install, tailor, and configure the new IBM PowerHA® Version 7.1.3, and understand new and improved features such as migrations, cluster administration, and advanced topics like configuring in a virtualized environment including workload partitions (WPARs). With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you. This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience. This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.

Deployment Guide for InfoSphere Guardium

Deployment Guide for InfoSphere Guardium
Author :
Publisher : IBM Redbooks
Total Pages : 472
Release :
ISBN-10 : 9780738439358
ISBN-13 : 0738439355
Rating : 4/5 (58 Downloads)

Synopsis Deployment Guide for InfoSphere Guardium by : Whei-Jen Chen

IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements. This IBM Redbooks® publication provides a guide for deploying the Guardium solutions. This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products. The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system. This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.

PowerHA SystemMirror for IBM i Cookbook

PowerHA SystemMirror for IBM i Cookbook
Author :
Publisher : IBM Redbooks
Total Pages : 488
Release :
ISBN-10 : 9780738436364
ISBN-13 : 0738436364
Rating : 4/5 (64 Downloads)

Synopsis PowerHA SystemMirror for IBM i Cookbook by : Hernando Bedoya

IBM® PowerHATM SystemMirror for i is the IBM high-availability disk-based clustering solution for the IBM i 7.1 operating system. When combined with IBM i clustering technology, PowerHA for i delivers a complete high-availability and disaster-recovery solution for your business applications running in the IBM System i® environment. PowerHA for i enables you to support high-availability capabilities with either native disk storage or IBM DS8000® or DS6000TM storage servers or IBM Storwize V7000 and SAN Volume Controllers. The latest release of IBM PowerHA SystemMirror for i delivers a brand-new web-based PowerHA graphical user interface that effectively combines the solution-based and task-based activities for your HA environment, all in a single user interface. This IBM Redbooks® publication provides a broad understanding of PowerHA for i. This book is intended for all IBM i professionals who are planning on implementing a PowerHA solution on IBM i.

z/VSE Using DB2 on Linux for System z

z/VSE Using DB2 on Linux for System z
Author :
Publisher : IBM Redbooks
Total Pages : 216
Release :
ISBN-10 : 9780738434001
ISBN-13 : 0738434000
Rating : 4/5 (01 Downloads)

Synopsis z/VSE Using DB2 on Linux for System z by : Helmut Hellner

Data is one the most critical and valuable assets of a business. Critical strategic decisions can be made more quickly and effectively when they are based on complete, accurate, and timely operational data. From this point of view, it is important to have an enterprise data management architecture that supports a flexible global view of the business. Many environments today are heterogeneous with a high quantity and diversity of data. In this IBM® Redbooks® publication, we help enterprise architects and IT managers with these environments make decisions for a centralized database or data warehouse. We recommend a centralized data management environment on Linux® on System z®. We include guidance for IBM z/VSETM and Linux specialists to reorganize existing IBM DB2® VSE data and build a database environment with continuous operation in Linux on System z. We begin this book by describing the possibilities and advantages of enterprise data management and different technical ways to realize it. Then we discuss planning, which is important for setting the foundation of the architecture that is implemented. We explain the hardware considerations for capacity and performance planning. For the z/VSE system and Linux on System z, we describe considerations for operation in a logical partition (LPAR) and in a virtualized environment with IBM z/VM®. In addition, we discuss the disk behavior for different workloads, storage dependencies, network connections, and DB2 database considerations. We also guide you in customizing the DB2 server for z/VSE, z/VM, and DB2 on Linux to allow existing z/VSE and z/VM applications to access the database on Linux on System z. We include the data migration, application considerations, dependencies, compatibility, monitoring, and tuning possibilities in such an environment.

IBM Cognos Dynamic Query

IBM Cognos Dynamic Query
Author :
Publisher : IBM Redbooks
Total Pages : 124
Release :
ISBN-10 : 9780738438726
ISBN-13 : 0738438723
Rating : 4/5 (26 Downloads)

Synopsis IBM Cognos Dynamic Query by : Nigel Campbell

This IBM® Redbooks® publication explains how IBM Cognos® Business Intelligence (BI) administrators, authors, modelers, and power users can use the dynamic query layer effectively. It provides guidance for determining which technology within the dynamic query layer can best satisfy your business requirements. Administrators can learn how to tune the query service effectively and preferred practices for managing their business intelligence content. This book includes information about metadata modeling of relational data sources with IBM Cognos Framework Manager. It includes considerations that can help you author high-performing applications that satisfy analytical requirements of users. This book provides guidance for troubleshooting issues related to the dynamic query layer of Cognos BI. Related documents: Solution Guide : Big Data Analytics with IBM Cognos BI Dynamic Query Blog post : IBM Cognos Dynamic Query Extensibility

Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption
Author :
Publisher : IBM Redbooks
Total Pages : 274
Release :
ISBN-10 : 9780738460222
ISBN-13 : 0738460222
Rating : 4/5 (22 Downloads)

Synopsis Getting Started with z/OS Data Set Encryption by : Bill White

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.