Search Results for - Narrowed by: Computer Science. - B&uuml;cker, Axel. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bScience.$002509Computer$002bScience.$0026qf$003dAUTHOR$002509Author$002509B$0025C3$0025BCcker$00252C$002bAxel.$002509B$0025C3$0025BCcker$00252C$002bAxel.$0026ps$003d300? 2024-05-29T17:01:28Z Using the IBM Security Framework and IBM Security Blueprint to realize business-driven security ent://SD_ILS/0/SD_ILS:2300443 2024-05-29T17:01:28Z 2024-05-29T17:01:28Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738437891/?ar">https://learning.oreilly.com/library/view/~/0738437891/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738437891/?ar">https://go.oreilly.com/library-access/library/view/-/0738437891/?ar</a><br/>Format:&#160;Electronic Resources<br/> IBM z/OS mainframe security and audit management using the IBM Security zSecure Suite ent://SD_ILS/0/SD_ILS:2301939 2024-05-29T17:01:28Z 2024-05-29T17:01:28Z by&#160;B&uuml;cker, Axel.<br/><a href="https://learning.oreilly.com/library/view/~/0738435880/?ar">https://learning.oreilly.com/library/view/~/0738435880/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738435880/?ar">https://go.oreilly.com/library-access/library/view/-/0738435880/?ar</a><br/>Format:&#160;Electronic Resources<br/>