22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other publications<br />

Online resources<br />

684 Lotus Security Handbook<br />

These publications are also relevant as further information sources:<br />

► Maximum Windows 2000 Security (Sams, 2001, ISBN 0672319659)<br />

► Maximum Linux Security (Sams, 1999, ISBN 0672316706)<br />

► D. Verton, “Common Ground Sought for IT Security Requirements,”<br />

Computerworld 35, No. 11, 8 (March 12, 2001)<br />

► P. B. Checkland, Systems Thinking, Systems Practice, John Wiley & Sons,<br />

Inc., New York (1981)<br />

► W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security: Repelling<br />

the Wily Hacker, Addison-Wesley Publishing Co., Reading, MA (1994)<br />

► E. Rechtin, Systems Architecting: Creating and Building Complex Systems,<br />

Prentice Hall, New York (1991)<br />

► Committee on Information Systems Trustworthiness, National Research<br />

Council, Trust in Cyberspace, National Academy Press, Washington, DC<br />

(1999)<br />

► A. Patel and S. O. Ciardhuain, “The Impact of Forensic Computing on<br />

Telecommunications,” IEEE Communications Magazine 38, No. 11, 64-67<br />

(November 2000)<br />

► F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on<br />

Information and System Security 3, No. 1, 30-50 (February 2000)<br />

► P. T. L. Lloyd and G. M. Galambos, “Technical Reference Architectures,” <strong>IBM</strong><br />

Systems Journal 38, No. 1, 51-75 (1999)<br />

► S. McClure, J. Scambray, and G. Kurtz, Hacking Exposed: Network Security<br />

Secrets & Solutions, McGraw-Hill Publishing Company, Maidenhead,<br />

Berkshire (1999)<br />

► Charles Carrington (Editor), Timothy Speed, Juanita Ellis, and Steffano<br />

Korper, Enterprise Directory and Security Implementation Guide: Designing<br />

and Implementing Directories in Your Organization. ISBN: 0121604527<br />

These Web sites and URLs are also relevant as further information sources:<br />

► RFC 2316, Report of the IAB Security Architecture Workshop (April 1998)<br />

http://www.ietf.org/rfc.html<br />

► Digital Signature Guidelines, American Bar Association (1996), Section 1.35<br />

http://www.abanet.org/scitech/ec/isc/dsgfree.html

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!