(Kevin Yeung-Kuen See, Sushma Narisetty, Raul F. Chong and Il-Sung Lee) Part 1 of this article series presents the DB2 security model, and discusses how user and group accounts interact with DB2 Universal Database (UDB). Part 2 of this series focuses on DB2 security plug-ins, the new method that imp
Read More - Register for Free Membership