Developing Secure IBM i Applications

On-Demand Webinar

Developing Secure IBM i Applications

IBM i

 

Although your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level.

This recorded webinar covers the most important security considerations for programmers as they design their applications:

  • Object ownership
  • Adopted authority
  • Public and private authorities
  • Command line permission
  • Client-server considerations

You’ll also learn why auditors are often deemed the programmer’s nemesis, and what it is they really need from you.

 

No transcript is available at this time.