Introduction
In this chapter, we will look at some advanced techniques that can be used to design efficient applications. We will see how we can improve security in 3-tier architecture applications. We will also look at the various methods of data encryption provided by DB2. Thereafter, we will see how we can extend the data type support provided by DB2 and apply them in our application design.