DB2 Database Assignment 2022
VerifiedAdded on 2022/10/11
|13
|918
|19
Presentation
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
DB2 DATABASE
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION TO DB2 DATABASE:
• The DB2 is a relational database which can deliver the
analytics capabilities and advanced data for transactional
workloads.
• The Db2 database software includes some of the advanced
features like advanced management, in memory technology,
development tools, workload management, continuous data
availability.
• The DB2 is a relational database which can deliver the
analytics capabilities and advanced data for transactional
workloads.
• The Db2 database software includes some of the advanced
features like advanced management, in memory technology,
development tools, workload management, continuous data
availability.
IBM DB2 DATABASE:
• On the premises of the optimized database is for delivering
the industry leading performance where the cost is low. The
db2 database of IBM is supported across Unix, Linux based
operating systems. With the simplification of Db2 database,
the users can use and download the Db2 as long as they
want.
• On the premises of the optimized database is for delivering
the industry leading performance where the cost is low. The
db2 database of IBM is supported across Unix, Linux based
operating systems. With the simplification of Db2 database,
the users can use and download the Db2 as long as they
want.
IMPORTANCE OF SECURITY
Db2 databases can hold the backbone of an entire organisation.
The triad of integrity, confidentiality and availability are the
actual foundation of the database security and information
security. Confidentiality is one of the important most aspect for
the security of Db2.
This is so much important to maintain the defences and security
practices for combatting the attacks on to the database.
Db2 databases can hold the backbone of an entire organisation.
The triad of integrity, confidentiality and availability are the
actual foundation of the database security and information
security. Confidentiality is one of the important most aspect for
the security of Db2.
This is so much important to maintain the defences and security
practices for combatting the attacks on to the database.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
UNIX AND SERVER VULNERABILITIES:
HARDENING THE UNIX/LINUX SYSTEM
• Two of the models for the security
control for accessing Db2 database
functions and system data. Access to
the database (Db2) system can be
managed through the facilities.
• After the account of the user is
authenticated, it id determined by
the database manager that the user
has been allowed for accessing the
DB2 resources and data.
• Two of the models for the security
control for accessing Db2 database
functions and system data. Access to
the database (Db2) system can be
managed through the facilities.
• After the account of the user is
authenticated, it id determined by
the database manager that the user
has been allowed for accessing the
DB2 resources and data.
DEPLOYMENT OF A WEB SERVER TO BE
USED BY NAVY INTELLIGENCE FOR
CHECKING ON PROJECT PROGRESS:
• Before the deployment of data web services to one of the
local server, at least one of the web server connection. The
use of the options that are advanced for configuring the
connections of the web server.
• The designer of the data web services have to be opened. If a
web server connection has not been configured for opening
the designer for the very first time.
• With the add ins of the database for the visual studio, the
web services can be created d which can expose the
operations of the database to the client related applications.
USED BY NAVY INTELLIGENCE FOR
CHECKING ON PROJECT PROGRESS:
• Before the deployment of data web services to one of the
local server, at least one of the web server connection. The
use of the options that are advanced for configuring the
connections of the web server.
• The designer of the data web services have to be opened. If a
web server connection has not been configured for opening
the designer for the very first time.
• With the add ins of the database for the visual studio, the
web services can be created d which can expose the
operations of the database to the client related applications.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
APACHE AND INTERNET
INFORMATION SERVER
In the Db2 database, both the internet information server and
apache server can be connected. Apache is one of the most
widely used web based servers, it runs on linux, unix, windows
and Mac OS. On the other side the Internet information servers
runs on windows only. Both the IIS and Apache is having their
own weaknesses and own strong points. The obvious most
advantages of the of IIS id the tight integration with the
technologies related to windows and for Apache is the cross
platform.
INFORMATION SERVER
In the Db2 database, both the internet information server and
apache server can be connected. Apache is one of the most
widely used web based servers, it runs on linux, unix, windows
and Mac OS. On the other side the Internet information servers
runs on windows only. Both the IIS and Apache is having their
own weaknesses and own strong points. The obvious most
advantages of the of IIS id the tight integration with the
technologies related to windows and for Apache is the cross
platform.
ARCHITECTURE OF DB2 DATABASE:
THE VERSIONS OF DB2 ARE AS
FOLLOWS:
Version Code Name
3.4 Cobweb
8.1, 8.2 Stinger
9.1 Viper
9.5 Viper 2
9.7 Cobra
9.8 It added features with Only
PureScale
10.1 Galileo
10.5 Kepler
FOLLOWS:
Version Code Name
3.4 Cobweb
8.1, 8.2 Stinger
9.1 Viper
9.5 Viper 2
9.7 Cobra
9.8 It added features with Only
PureScale
10.1 Galileo
10.5 Kepler
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
USE OF APACHE AND IIS FOR
SECURITY:
• For the perspective of security, the choice between Apache
and IIS is debatable. The security of web server, is as good as
the operating system that is underlying. The consideration of
the skills of the system admin rights to the operating system.
SECURITY:
• For the perspective of security, the choice between Apache
and IIS is debatable. The security of web server, is as good as
the operating system that is underlying. The consideration of
the skills of the system admin rights to the operating system.
REFERENCES:
• Barber, R., Lohman, G., Raman, V., Sidle, R., Lightstone, S., & Schiefer, B. (2015, April). In-memory BLU acceleration
in IBM's DB2 and dashDB: Optimized for modern workloads and hardware architectures. In 2015 IEEE 31st
International Conference on Data Engineering (pp. 1246-1252). IEEE.
• Chan, Y., Ivanov, N., & Mueller, O. (2014). Oracle to DB2 Conversion Guide: Compatibility Made Easy. IBM Redbooks.
• Deenadayalan, E., Hanirex, D., & Kaliyamurthie, K. (2014). Association rule mining in distributed database
system. International Journal of Computer Science and Mobile Computing, 3(4), 727-732.
• Deenadayalan, E., Hanirex, D., & Kaliyamurthie, K. (2014). Association rule mining in distributed database
system. International Journal of Computer Science and Mobile Computing, 3(4), 727-732.
• Drzymala, P., & Welfle, H. (2014). DB2 pureXML-advanced of data storage in the relational hierarchical
structures. Przegląd Elektrotechniczny, 90(3), 165-168.
• Ebbers, M., Bosch, W., Ebert, H. J., Hellner, H., Johnston, J., Kroll, M., ... & Schmidbauer, J. (2016). Introduction to the
New Mainframe: IBM Z/VSE Basics. IBM Redbooks.
• Francis-Lothai, F. L. O. R. E. N. C. E., & Bong, D. B. (2015). Fingerdos: a fingerprint database based on optical
sensor. Wseas Transactions On Information Science And Applications, 12(29), 297-304.
• Halvorsen, H. P. (2016). Introduction to Database Systems. Notodden, Norway: University College of Southeast
Norway.
• Petkovic, D. (2016). Temporal data in relational database systems: a comparison. In New Advances in Information
Systems and Technologies (pp. 13-23). Springer, Cham.
• Barber, R., Lohman, G., Raman, V., Sidle, R., Lightstone, S., & Schiefer, B. (2015, April). In-memory BLU acceleration
in IBM's DB2 and dashDB: Optimized for modern workloads and hardware architectures. In 2015 IEEE 31st
International Conference on Data Engineering (pp. 1246-1252). IEEE.
• Chan, Y., Ivanov, N., & Mueller, O. (2014). Oracle to DB2 Conversion Guide: Compatibility Made Easy. IBM Redbooks.
• Deenadayalan, E., Hanirex, D., & Kaliyamurthie, K. (2014). Association rule mining in distributed database
system. International Journal of Computer Science and Mobile Computing, 3(4), 727-732.
• Deenadayalan, E., Hanirex, D., & Kaliyamurthie, K. (2014). Association rule mining in distributed database
system. International Journal of Computer Science and Mobile Computing, 3(4), 727-732.
• Drzymala, P., & Welfle, H. (2014). DB2 pureXML-advanced of data storage in the relational hierarchical
structures. Przegląd Elektrotechniczny, 90(3), 165-168.
• Ebbers, M., Bosch, W., Ebert, H. J., Hellner, H., Johnston, J., Kroll, M., ... & Schmidbauer, J. (2016). Introduction to the
New Mainframe: IBM Z/VSE Basics. IBM Redbooks.
• Francis-Lothai, F. L. O. R. E. N. C. E., & Bong, D. B. (2015). Fingerdos: a fingerprint database based on optical
sensor. Wseas Transactions On Information Science And Applications, 12(29), 297-304.
• Halvorsen, H. P. (2016). Introduction to Database Systems. Notodden, Norway: University College of Southeast
Norway.
• Petkovic, D. (2016). Temporal data in relational database systems: a comparison. In New Advances in Information
Systems and Technologies (pp. 13-23). Springer, Cham.
THANK YOU
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.