O'Reilly logo

Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between by Carol Woodbury, Jeroen Van Lommel, Paul Tuohy, Jon Rush, Tim Rowe, Jim Ritchhart, Pascal Polverini, Trevor Perry, Mike Pavlak, Jon Paris, Michel Mouchon, Brian May, Isaac Ramírez Herrera, Jesse Gorzinski, Susan Gantner, Antonio Florez, Mark Evans, John Eberhard, Rich Diedrich, Dan Cruikshank, Tony Cairns, Hernando Bedoya, Nadir K. Amra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security
As with any project, security planning should be a major part of a modernization project. Security should be considered for all changes that are made when you modernize, but modernization is a great time to examine the overall security of your application and your system. There are multiple areas, or levels, to consider regarding security.
This chapter covers some basic concepts. There are entire books on the topic of IBM i security and companies that specialize in securing systems. A great place to start is Security Guide for IBM i V6.1 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required