Search Results for - Narrowed by: Bücker, Axel. - International Business Machines Corporation. International Technical Support Organization.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509B$0025C3$0025BCcker$00252C$002bAxel.$002509B$0025C3$0025BCcker$00252C$002bAxel.$0026qf$003dAUTHOR$002509Author$002509International$002bBusiness$002bMachines$002bCorporation.$002bInternational$002bTechnical$002bSupport$002bOrganization.$002509International$002bBusiness$002bMachines$002bCorporation.$002bInternational$002bTechnical$002bSupport$002bOrganization.$0026ps$003d300?2024-06-20T00:09:56ZUsing the IBM Security Framework and IBM Security Blueprint to realize business-driven securityent://SD_ILS/0/SD_ILS:23004432024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738437891/?ar">https://learning.oreilly.com/library/view/~/0738437891/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738437891/?ar">https://go.oreilly.com/library-access/library/view/-/0738437891/?ar</a><br/>Format: Electronic Resources<br/>Managing security and compliance in cloud or virtualized data centersent://SD_ILS/0/SD_ILS:23028842024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437670/?ar">https://go.oreilly.com/library-access/library/view/-/0738437670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437670/?ar">https://learning.oreilly.com/library/view/~/0738437670/?ar</a><br/>Format: Electronic Resources<br/>Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Managerent://SD_ILS/0/SD_ILS:22975122024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436984">https://learning.oreilly.com/library/view/~/0738436984</a>
<a href="https://learning.oreilly.com/library/view/~/0738436984/?ar">https://learning.oreilly.com/library/view/~/0738436984/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436984/?ar">https://go.oreilly.com/library-access/library/view/-/0738436984/?ar</a><br/>Format: Electronic Resources<br/>Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2ent://SD_ILS/0/SD_ILS:23020602024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738437034/?ar">https://go.oreilly.com/library-access/library/view/-/0738437034/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738437034/?ar">https://learning.oreilly.com/library/view/~/0738437034/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion prevention design guideent://SD_ILS/0/SD_ILS:22943532024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738436216/?ar">https://learning.oreilly.com/library/view/~/0738436216/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738436216/?ar">https://go.oreilly.com/library-access/library/view/-/0738436216/?ar</a><br/>Format: Electronic Resources<br/>IBM z/OS mainframe security and audit management using the IBM Security zSecure Suiteent://SD_ILS/0/SD_ILS:23019392024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738435880/?ar">https://learning.oreilly.com/library/view/~/0738435880/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738435880/?ar">https://go.oreilly.com/library-access/library/view/-/0738435880/?ar</a><br/>Format: Electronic Resources<br/>Deployment guides series. IBM Tivoli Compliance Insight Managerent://SD_ILS/0/SD_ILS:22946672024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format: Electronic Resources<br/>Robust data synchronization with IBM Tivoli Directory Integratorent://SD_ILS/0/SD_ILS:22955422024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738497479">https://learning.oreilly.com/library/view/~/0738497479</a>
<a href="https://learning.oreilly.com/library/view/~/0738497479/?ar">https://learning.oreilly.com/library/view/~/0738497479/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738497479/?ar">https://go.oreilly.com/library-access/library/view/-/0738497479/?ar</a><br/>Format: Electronic Resources<br/>Certification study guide. IBM Tivoli Access Manager for e-business 6.0ent://SD_ILS/0/SD_ILS:22958052024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738496030">https://learning.oreilly.com/library/view/~/0738496030</a>
<a href="https://learning.oreilly.com/library/view/~/0738496030/?ar">https://learning.oreilly.com/library/view/~/0738496030/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738496030/?ar">https://go.oreilly.com/library-access/library/view/-/0738496030/?ar</a><br/>Format: Electronic Resources<br/>Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutionsent://SD_ILS/0/SD_ILS:23024892024-06-20T00:09:56Z2024-06-20T00:09:56Zby Bücker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738421014">https://learning.oreilly.com/library/view/~/0738421014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738421014/?ar">https://go.oreilly.com/library-access/library/view/-/0738421014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738421014/?ar">https://learning.oreilly.com/library/view/~/0738421014/?ar</a><br/>Format: Electronic Resources<br/>