| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996343849003316 |
|
|
Titolo |
Medical cannabis and cannabinoids |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Basel : , : Karger, , [2018]- |
|
|
|
|
|
|
|
ISSN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cannabis |
Cannabinoids |
Marijuana - Therapeutic use |
Medical Marijuana |
Periodicals. |
Periodical |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910964464003321 |
|
|
Autore |
Bücker Axel |
|
|
Titolo |
Integrated identity management using IBM Tivoli security solutions / / [Axel Bucker ... et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Austin, TX, : IBM, International Technical Support Organization, c2004 |
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (198 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Electronic commerce - Security measures |
Business enterprises - Computer networks - Security measures |
Computer networks - Access control |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"May 2004." |
"SG24-6054-00." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Why Integrated Identity Management -- Chapter 1. An introduction to a new reference architecture -- 1.1 Everything is on demand today -- 1.2 Security management methods and practices -- 1.2.1 Confidentiality -- 1.2.2 Integrity -- 1.2.3 Availability -- 1.2.4 Areas of security implied in the CIA Triad -- 1.3 Business drivers -- 1.4 Issues affecting identity integration solutions -- 1.5 Integrated identity in the enterprise -- 1.5.1 Access control management -- 1.5.2 Identity and credential management -- 1.5.3 Audit management -- 1.5.4 Directory management -- 1.5.5 Privacy management -- 1.6 Conclusion -- Chapter 2. What Bank International -- 2.1 Company profile -- 2.1.1 Geographic distribution of WBI -- 2.1.2 Organization of WBI -- 2.1.3 HR and personnel procedures -- 2.2 Current IT architecture -- 2.2.1 Overview of the WBI network -- 2.2.2 Recently implemented e-business initiative -- 2.2.3 Security infrastructure deployed for the e-business initiative -- 2.2.4 Secured e-business initiative architecture -- 2.2.5 Identity management and emerging problems -- 2.3 Corporate business vision and objectives -- 2.4 Business requirements -- 2.4.1 Business requirements for phase 1 -- 2.4.2 Business requirements for phase 2 -- 2.5 Functional |
|
|
|
|
|
|
|
|
|
|
requirements -- 2.5.1 Phase 1 -- 2.5.2 Phase 2 -- 2.6 Risk assessment -- 2.6.1 WBI risk assessment -- 2.7 Security design objectives -- 2.7.1 Functional design objectives -- 2.7.2 Non-functional design objectives -- 2.8 Architectural decisions -- Chapter 3. Applying the reference architecture -- 3.1 Solution design and delivery approach -- 3.1.1 Implementation life-cycle -- 3.1.2 Requirements analysis -- 3.1.3 Incremental delivery strategy -- 3.2 WBI solution design. |
3.2.1 Solution overview -- 3.2.2 Component model -- 3.2.3 The operational architecture -- 3.2.4 The security architecture -- 3.2.5 Implementation phases -- Chapter 4. Implementing the solution -- 4.1 Development environment overview -- 4.1.1 Component model -- 4.1.2 Operational model -- 4.1.3 Security architecture -- 4.2 Technical implementation -- 4.2.1 Automatic provisioning -- 4.2.2 Application subscription -- 4.2.3 Self care -- 4.2.4 Self registration -- 4.3 Conclusion -- Part 2 Appendixes -- Appendix A. ISO 17799 compliance mapping -- Corporate policy and standards -- Standards, practices, and procedures -- Practical example -- External standards and certifications -- Industry specific requirements -- Product or solution certifications -- Nationally and internationally recognized standards -- Legal requirements -- ISO 17799 and integrated identity management -- Summary -- Glossary -- Related publications -- IBM Redbooks -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover. |
|
|
|
|
|
| |