Tag Archives: AS400 security

In the latest version of her well-known IBM i security reference, IBM i Security Administration and Compliance, Carol Woodbury hits the ball out of the park. Not only does the book provide valuable technical information, it also introduces the reader … Continue reading

Posted in Announcement, IBM i Security | Tagged , , , , , | Leave a comment

“Security by obscurity” means relying on lack of knowledge of how a thing is protected as the sole means of preventing unauthorized access to that thing. There’s been a debate going on over at the Midrange-L discussion forum about the efficacy of this … Continue reading

Posted in Encryption, IBM i Security | Tagged , , , , | Leave a comment