Руководство по безопасности в Lotus Notes
: Литература по курсу
Опубликован: 04.07.2008 | Доступ: свободный | Студентов: 636 / 33 | Оценка: 4.83 / 5.00 | Длительность: 42:11:00
Тема: Безопасность
Специальности: Администратор информационных систем, Специалист по безопасности
Теги:
- 1.Lotus Notes and Domino R5.0 Security Infrastructure RevealedSG24-5341
- 2.IBM WebSphere V5.0 Security WebSphere Handbook SeriesSG24-6573
- 3.Upgrading to Lotus Notes and Domino 6SG24-6889
- 4.Deploying QuickPlaceSG24-6535
- 5.Enterprise Security Architecture using IBM Tivoli Security SolutionsSG24-6014
- 6.A Deeper Look into IBM Directory IntegratorREDP-3728
- 7.IBM Tivoli Access Manager for e-businessREDP-3677
- 8.Enterprise Business Portals II with IBM Tivoli Access ManagerSG24-6885
- 9.Deploying a Public Key InfrastructureSG24-5512
- 10.Understanding LDAPSG24-4986
- 11.LDAP Implementation CookbookSG24-5110
- 12.Using LDAP for Directory Integration: A Look at IBM SecureWay Directory, Active Directory,and DominoSG24-6163
- 13.Implementation and Practical Use of LDAP on the IBM e-server iSeries ServerSG24-6193
- 14.LDAP Directory Services in IBM WebSphere Everyplace Access V4.1.1REDP-3603
- 15.Active Directory Synchronization with Lotus ADSyncREDP-0605
- 16.IBM WebSphere V4.0 Advanced Edition SecuritySG24-6520
- 17.WebSphere Portal Handbook Volume 1SG24-6883
- 18.IBM Lotus Learning Management System HandbookG24-7028 Прочие публикации
- 19.Maximum Windows 2000 SecuritySams, 2001, ISBN 0672319659
- 20.Maximum Linux SecuritySams, 1999, ISBN 0672316706
- 21.Common Ground Sought for IT Security RequirementsComputerworld 35, No. 11, 8 (March 12, 2001)
- 22.Systems Thinking, Systems PracticeJohn Wiley & Sons, Inc., New York (1981)
- 23.Firewalls and Internet Security: Repelling the Wily HackerAddison-Wesley Publishing Co., Reading, MA (1994)
- 24.Systems Architecting: Creating and Building Complex SystemsPrentice Hall, New York (1991)
- 25.Committee on Information Systems Trustworthiness, National Research Council, Trust in CyberspaceNational Academy Press, Washington, DC (1999)
- 26.The Impact of Forensic Computing on TelecommunicationsIEEE Communications Magazine 38, No. 11, 64-67 (November 2000)
- 27.Enforceable Security PoliciesACM Transactions on Information and System Security 3, No. 1, 30-50 (February 2000)
- 28.Technical Reference ArchitecturesIBM Systems Journal 38, No. 1, 51-75 (1999)
- 29.Hacking Exposed: Network Security Secrets & SolutionsMcGraw-Hill Publishing Company, Maidenhead, Berkshire (1999)
- 30.Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your OrganizationISBN: 0121604527
- 31.
- 32.American Bar Association (1996), Section 1.35
- 34.ISO/IEC 15408-2 (1999). and Information Technology--Security Techniques--Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements, ISO/IEC 15408-3 (1999)
- 35.ISO/IEC PDTR 15446
- 36.
- 37.ITU-T Recommendation X.800/ISO 7498-2 (1991)
- 38.Proceedings, 21st National Information Systems Security Conference, Arlington, VA (October 6-9,1998)