Опубликован: 04.07.2008 | Доступ: свободный | Студентов: 636 / 33 | Оценка: 4.83 / 5.00 | Длительность: 42:11:00
  • 1.
    Lotus Notes and Domino R5.0 Security Infrastructure Revealed
  • 2.
    IBM WebSphere V5.0 Security WebSphere Handbook Series
  • 3.
    Upgrading to Lotus Notes and Domino 6
  • 4.
    Deploying QuickPlace
  • 5.
    Enterprise Security Architecture using IBM Tivoli Security Solutions
  • 6.
    A Deeper Look into IBM Directory Integrator
  • 7.
    IBM Tivoli Access Manager for e-business
  • 8.
    Enterprise Business Portals II with IBM Tivoli Access Manager
  • 9.
    Deploying a Public Key Infrastructure
  • 10.
    Understanding LDAP
  • 11.
    LDAP Implementation Cookbook
  • 12.
    Using LDAP for Directory Integration: A Look at IBM SecureWay Directory, Active Directory,and Domino
  • 13.
    Implementation and Practical Use of LDAP on the IBM e-server iSeries Server
  • 14.
    LDAP Directory Services in IBM WebSphere Everyplace Access V4.1.1
  • 15.
    Active Directory Synchronization with Lotus ADSync
  • 16.
    IBM WebSphere V4.0 Advanced Edition Security
  • 17.
    WebSphere Portal Handbook Volume 1
  • 18.
    IBM Lotus Learning Management System Handbook
  • 19.
    Maximum Windows 2000 Security
  • 20.
    Maximum Linux Security
  • 21.
    D. Verton
    Common Ground Sought for IT Security Requirements
  • 22.
    P. B. Checkland
    Systems Thinking, Systems Practice
  • 23.
    W. R. Cheswick and S. M. Bellovin
    Firewalls and Internet Security: Repelling the Wily Hacker
  • 24.
    E. Rechtin
    Systems Architecting: Creating and Building Complex Systems
  • 25.
    Committee on Information Systems Trustworthiness, National Research Council, Trust in Cyberspace
  • 26.
    A. Patel and S. O. Ciardhuain
    The Impact of Forensic Computing on Telecommunications
  • 27.
    F. B. Schneider
    Enforceable Security Policies
  • 28.
    P. T. L. Lloyd and G. M. Galambos
    Technical Reference Architectures
  • 29.
    and G. Kurtz, J. Scambray, S. McClure
    Hacking Exposed: Network Security Secrets & Solutions
  • 30.
    and Steffano Korper, Charles Carrington (Editor), Juanita Ellis, Timothy Speed
    Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
  • 32.
  • 34.
  • 38.
    J. J. Whitmore