Search Results - Bücker, Axel
- Showing 1 – 20 results of 27
- Go to Next Page
-
1Cloud security guidelines for IBM power systemsPublished 2015Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
2Reduce risk and improve security on IBM mainframes: Volume 2: Mainframe communication and networking securityPublished 2015Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
3Reduce risk and improve security on IBM mainframes: Volume 3: Mainframe subsystem and application securityPublished 2015Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
4IBM System z in a mobile world: providing secure and timely mobile access to the mainframePublished 2014Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
5Security on the IBM mainframe: a holistic approach to reduce risk and improve security; Volume 1Published 2014Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
6Deployment guide series: IBM Tivoli Identity Manager 5.0Published 2008Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
7Certification study guide: IBM Tivoli Access Manager for e-business 6.0Published 2006Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
8Identity management advanced design for IBM Tivoli identity managerPublished 2006Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
9Enterprise business portals II with IBM tivoli access managerPublished 2003Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
10Managing security and compliance in cloud or virtualized data centersPublished 2013Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
11Using the IBM Security Framework and IBM Security Blueprint to realize business-driven securityPublished 2013Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
12Enterprise Single Sign-On design guide: using IBM Security Access Manager for Enterprise Single Sign-On 8.2Published 2012Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
13Endpoint security and compliance management design guide: using IBM Tivoli Endpoint ManagerPublished 2012Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
14Integrating IBM security and SAP solutionsPublished 2012Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
15IBM z/OS mainframe security and audit management using the IBM Security zSecure SuitePublished 2011Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
16Network intrusion prevention design guidePublished 2011Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
17Deployment guides series: IBM Tivoli Compliance Insight ManagerPublished 2008Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
18Robust data synchronization with IBM Tivoli Directory IntegratorPublished 2006Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
19Check Point VPN-1/FireWall-1 on AIX: a cookbook for stand-alone and high availability solutionsPublished 2001Other Authors: “…Bücker, Axel…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
20Federated identity management and web services security with IBM tivoli security solutionsPublished 2005Call Number: Loading…
Located: Loading…
Electronic eBook Loading…