Related Books

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computer networks
Type: BOOK - Published: 2013 - Publisher:

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
Language: en
Pages: 494
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2012-09-11 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Language: en
Pages: 332
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2016-03-22 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasi
Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation
Language: en
Pages: 390
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-10-12 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodie