Error message

  • Warning: include_once(sites/all/modules/socialmedia/socialmedia.widgets.inc): failed to open stream: No such file or directory in include_once() (line 31 of /home/salim215/public_html/sites/all/modules/socialmedia/socialmedia.module).
  • Warning: include_once(): Failed opening 'sites/all/modules/socialmedia/socialmedia.widgets.inc' for inclusion (include_path='.:/opt/alt/php74/usr/share/pear') in include_once() (line 31 of /home/salim215/public_html/sites/all/modules/socialmedia/socialmedia.module).

IBM i and System i Information Center

The IBM® i and System i ® Information Centers are your source for technical information about hardware and software solutions for the IBM System i™ platform.

The IBM i information centers are powered by Eclipse. The local language setting of your browser determines the language version of the information center content.

The links to the IBM information article is below Read more about IBM i and System i Information Center

IBM Data Integration

Data integration is the combination of technical and business processes used to combine data from disparate sources into meaningful and valuable information. A complete data integration solution encompasses discovery, cleansing, monitoring, transforming and delivery of data from a variety of sources.
Read more about IBM Data Integration

CERT-Developed Curricula and Course Materials

The CERT Cybersecurity Engineering team researches how to best address security and survivability throughout the development and acquisition lifecycles, especially in the early stages. This same team also develops curricula and educational materials that cover knowledge areas that link to their research in the following areas.

The link to the article and the relevant course materials are below Read more about CERT-Developed Curricula and Course Materials

Part1: Introduction to Information Assurance

Lectures on part 1 to 5 for introduction to Information Assurance and Security. Lecture 1 gives an introduction about Information Assurance. Lectures 2 and 3 talk about security information and event management, various types of access control (MAC, DAC, and RBAC) and a discussion of firewalls and intrusion prevention. Lecture 4 discusses on how to develop a security program, including policies, standards, and guidelines. In lecture 5, the lecturer tackles network and system threat modeling using attack tree examples. Read more about Part1: Introduction to Information Assurance