1.
Lotus Notes and Domino R5.0 Security Infrastructure Revealed
SG24-5341
2.
IBM WebSphere V5.0 Security WebSphere Handbook Series
SG24-6573
3.
Upgrading to Lotus Notes and Domino 6
SG24-6889
4.
Deploying QuickPlace
SG24-6535
5.
Enterprise Security Architecture using IBM Tivoli Security Solutions
SG24-6014
6.
A Deeper Look into IBM Directory Integrator
REDP-3728
7.
IBM Tivoli Access Manager for e-business
REDP-3677
8.
Enterprise Business Portals II with IBM Tivoli Access Manager
SG24-6885
9.
Deploying a Public Key Infrastructure
SG24-5512
10.
Understanding LDAP
SG24-4986
11.
LDAP Implementation Cookbook
SG24-5110
12.
Using LDAP for Directory Integration: A Look at IBM SecureWay Directory, Active Directory,and Domino
SG24-6163
13.
Implementation and Practical Use of LDAP on the IBM e-server iSeries Server
SG24-6193
14.
LDAP Directory Services in IBM WebSphere Everyplace Access V4.1.1
REDP-3603
15.
Active Directory Synchronization with Lotus ADSync
REDP-0605
16.
IBM WebSphere V4.0 Advanced Edition Security
SG24-6520
17.
WebSphere Portal Handbook Volume 1
SG24-6883
18.
IBM Lotus Learning Management System Handbook
G24-7028 Прочие публикации
19.
Maximum Windows 2000 Security
Sams, 2001, ISBN 0672319659
20.
Maximum Linux Security
Sams, 1999, ISBN 0672316706
21.
D. Verton
Common Ground Sought for IT Security Requirements
Computerworld 35, No. 11, 8 (March 12, 2001)
22.
P. B. Checkland
Systems Thinking, Systems Practice
John Wiley & Sons, Inc., New York (1981)
23.
W. R. Cheswick and S. M. Bellovin
Firewalls and Internet Security: Repelling the Wily Hacker
Addison-Wesley Publishing Co., Reading, MA (1994)
24.
E. Rechtin
Systems Architecting: Creating and Building Complex Systems
Prentice Hall, New York (1991)
25.
Committee on Information Systems Trustworthiness, National Research Council, Trust in Cyberspace
National Academy Press, Washington, DC (1999)
26.
A. Patel and S. O. Ciardhuain
The Impact of Forensic Computing on Telecommunications
IEEE Communications Magazine 38, No. 11, 64-67 (November 2000)
27.
F. B. Schneider
Enforceable Security Policies
ACM Transactions on Information and System Security 3, No. 1, 30-50 (February 2000)
28.
P. T. L. Lloyd and G. M. Galambos
Technical Reference Architectures
IBM Systems Journal 38, No. 1, 51-75 (1999)
29.
and G. Kurtz, J. Scambray, S. McClure
Hacking Exposed: Network Security Secrets & Solutions
McGraw-Hill Publishing Company, Maidenhead, Berkshire (1999)
30.
and Steffano Korper, Charles Carrington (Editor), Juanita Ellis, Timothy Speed
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
ISBN: 0121604527
32.
American Bar Association (1996), Section 1.35
34.
ISO/IEC 15408-2 (1999). and Information Technology--Security Techniques--Evaluation Criteria for IT Security-Part 3: Security Assurance Requirements, ISO/IEC 15408-3 (1999)
37.
ITU-T Recommendation X.800/ISO 7498-2 (1991)
38.
J. J. Whitmore
Proceedings, 21st National Information Systems Security Conference, Arlington, VA (October 6-9,1998)