Tighten Your DB2/400 Security

Counting on the programs that access your AS/400 data to enforce security? A better approach is to secure the data itself. Here's the latest on securing logical files and interfaces such as DDM and ODBC and on the potential exposures of triggers.

Michael Otey

March 6, 2013

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Tighten Your DB2/400 Security

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like