1.
Lotus Notes and Domino R5.0 Security Infrastructure Revealed
SG24-5341
2.
IBM WebSphere V5.0 Security WebSphere Handbook Series
SG24-6573
3.
Upgrading to Lotus Notes and Domino 6
SG24-6889
4.
Deploying QuickPlace
SG24-6535
5.
Enterprise Security Architecture using IBM Tivoli Security Solutions
SG24-6014
6.
A Deeper Look into IBM Directory Integrator
REDP-3728
7.
IBM Tivoli Access Manager for e-business
REDP-3677
8.
Enterprise Business Portals II with IBM Tivoli Access Manager
SG24-6885
9.
Deploying a Public Key Infrastructure
SG24-5512
10.
Understanding LDAP
SG24-4986
11.
LDAP Implementation Cookbook
SG24-5110
12.
Using LDAP for Directory Integration: A Look at IBM SecureWay Directory, Active Directory,and Domino
SG24-6163
13.
Implementation and Practical Use of LDAP on the IBM e-server iSeries Server
SG24-6193
14.
LDAP Directory Services in IBM WebSphere Everyplace Access V4.1.1
REDP-3603
15.
Active Directory Synchronization with Lotus ADSync
REDP-0605
16.
IBM WebSphere V4.0 Advanced Edition Security
SG24-6520
17.
WebSphere Portal Handbook Volume 1
SG24-6883
18.
IBM Lotus Learning Management System Handbook
G24-7028 Прочие публикации
19.
Maximum Windows 2000 Security
Sams, 2001, ISBN 0672319659
20.
Maximum Linux Security
Sams, 1999, ISBN 0672316706
21.
Common Ground Sought for IT Security Requirements
Computerworld 35, No. 11, 8 (March 12, 2001)
22.
Systems Thinking, Systems Practice
John Wiley & Sons, Inc., New York (1981)
23.
Firewalls and Internet Security: Repelling the Wily Hacker
Addison-Wesley Publishing Co., Reading, MA (1994)
24.
Systems Architecting: Creating and Building Complex Systems
Prentice Hall, New York (1991)
25.
Committee on Information Systems Trustworthiness, National Research Council, Trust in Cyberspace
National Academy Press, Washington, DC (1999)
26.
The Impact of Forensic Computing on Telecommunications
IEEE Communications Magazine 38, No. 11, 64-67 (November 2000)
27.
Enforceable Security Policies
ACM Transactions on Information and System Security 3, No. 1, 30-50 (February 2000)
28.
Technical Reference Architectures
IBM Systems Journal 38, No. 1, 51-75 (1999)
29.
Hacking Exposed: Network Security Secrets & Solutions
McGraw-Hill Publishing Company, Maidenhead, Berkshire (1999)
30.
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
ISBN: 0121604527
32.
American Bar Association (1996), Section 1.35
34.
ISO/IEC 15408-2 (1999). and Information Technology--Security Techniques--Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements, ISO/IEC 15408-3 (1999)
37.
ITU-T Recommendation X.800/ISO 7498-2 (1991)
38.
Proceedings, 21st National Information Systems Security Conference, Arlington, VA (October 6-9,1998)