Related Books
Language: en
Pages: 314
Pages: 314
Type: BOOK - Published: 2011-10-26 - Publisher: IBM Redbooks
In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to
Language: en
Pages: 587
Pages: 587
Type: BOOK - Published: 2015-12-16 - Publisher: Springer
This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in Dece
Language: en
Pages: 464
Pages: 464
Type: BOOK - Published: 2010-07-16 - Publisher: IBM Redbooks
To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices frame
Language: en
Pages: 240
Pages: 240
Type: BOOK - Published: 2014-02-06 - Publisher: IBM Redbooks
Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to
Language: en
Pages: 1076
Pages: 1076
Type: BOOK - Published: 2007-08-07 - Publisher: IBM Redbooks
This IBM Redbooks publication reviews the overall Tivoli Enterprise Security Architecture. It focuses on the integration of audit and compliance, access control