Glossary
Audit sensitive table access with EXECUTE
for tables containing PII, PHI, or financial data, record who accessed what.
Learn More
IBM DB2
—
Chapter 19: Security and Authorization — Authentication, Privileges, Roles, Row-Level Security, and Audit
Related Terms
"DB2 for z/OS: Diagnosis Guide and Reference"
"db2pd — A Practical Guide"
"On Writing Well" by William Zinsser
"Optimizing DB2 Queries with IBM Data Studio"
"Oracle to DB2 Conversion Guide"
"Presenting to Win" by Jerry Weissman
"Sargable Predicates and Index Design"
"Self-Tuning Memory Manager: Under the Hood"