Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
Counting on the programs that access your AS/400 data to enforce security? A better approach is to secure the data itself. Here's the latest on securing logical files and interfaces such as DDM and ODBC and on the potential exposures of triggers.
March 6, 2013
Tighten Your DB2/400 Security
You May Also Like