Related Books

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
Language: en
Pages: 314
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2011-10-26 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to
Information Systems Security
Language: en
Pages: 587
Authors: Sushil Jajoda
Categories: Computers
Type: BOOK - Published: 2015-12-16 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in Dece
Enterprise Security Architecture Using IBM Tivoli Security Solutions
Language: en
Pages: 1076
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2007-08-07 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control
Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
Language: en
Pages: 422
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2012-08-22 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Language: en
Pages: 464
Authors: Axel Buecker
Categories: Computers
Type: BOOK - Published: 2010-07-16 - Publisher: IBM Redbooks

DOWNLOAD EBOOK

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices frame