Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks

GET EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Language: en
Pages: 240
Authors: Axel Buecker
Categories: Computer networks
Type: BOOK - Published: 2013 - Publisher:

GET EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
IBM Security Solutions Architecture for Network, Server and Endpoint
Language: en
Pages: 510
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2011-02-17 - Publisher: IBM Redbooks

GET EBOOK

Threats come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent, but many times the authors
Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
Language: en
Pages: 494
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2012-09-11 - Publisher: IBM Redbooks

GET EBOOK

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Language: en
Pages: 332
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2016-03-22 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasi