top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Deployment guide series : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bucker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Architecture and design -- Chapter 1. Business context for security compliance management -- 1.1 Introduction to compliance management -- 1.2 Why compliance management? -- 1.3 Determining the how: influencing factors -- 1.4 General challenges -- 1.5 Conclusion -- Chapter 2. Tivoli Security Compliance Manager design and structure -- 2.1 Logical component architecture -- 2.1.1 Data collection components -- 2.1.2 Compliance evaluation components -- 2.1.3 Compliance report components -- 2.1.4 Security Compliance Manager server -- 2.1.5 Administration components -- 2.2 Physical component architecture -- 2.2.1 Communication port usage -- 2.2.2 Deployment on physical nodes -- 2.3 Security Compliance Manager walkthrough -- Chapter 3. Architecting a Security Compliance Management solution -- 3.1 Solution architectures, design, and methodologies -- 3.2 Design process -- 3.2.1 Typical context of Security Compliance Manager solutions -- 3.2.2 Phased project approach -- 3.2.3 Placing components in network zones -- 3.2.4 Deployment of Security Compliance Manager clients -- 3.2.5 Delegated administration -- 3.2.6 Implementation of Security Compliance Manager policies -- 3.2.7 Integration with access control management systems -- 3.2.8 Integration with Tivoli Risk Manager -- 3.3 Business processes and compliance management -- 3.3.1 A generic security compliance management business process -- 3.3.2 Security Compliance Manager business process support -- 3.3.3 Automated security compliance management -- Part 2 Customer environment -- Chapter 4. Armando Brothers Banking Corp. -- 4.1 Company profile -- 4.2 Current IT architecture -- 4.2.1 Existing security infrastructure -- 4.2.2 Existing middleware infrastructure.
4.3 Current security policies and standards -- 4.4 Emerging problems -- 4.5 Strategic objectives -- 4.6 Critical success factors for strategy implementation -- 4.7 Resulting business requirements -- 4.8 Requirements on project execution -- 4.9 ROI study and results -- Chapter 5. Security Compliance Manager design -- 5.1 Functional requirements -- 5.1.1 Phase I: Establishing a baseline -- 5.1.2 Phase II: Extend coverage -- 5.2 Design objectives -- 5.2.1 General and infrastructure objectives -- 5.2.2 Platform specific security concepts -- 5.3 Implementation architecture -- 5.3.1 Physical components -- 5.3.2 User roles and responsibilities -- 5.4 Project organization -- Chapter 6. Technical implementation -- 6.1 Deployment phase I -- 6.1.1 Planning and installing the server -- 6.1.2 DB2 maintenance tasks -- 6.1.3 Deploying clients -- 6.1.4 Installing the reporting server -- 6.1.5 Configuring operational reports -- 6.2 Deployment phase II -- 6.2.1 Tivoli Access Manager integration -- 6.2.2 Tivoli Risk Manager integration -- 6.2.3 Collector development -- 6.2.4 Report development -- 6.3 Conclusion -- Part 3 Appendixes -- Appendix A. Developing a custom collector -- Required method getReleaseNumber() -- Required method getCompatibleOS() -- Required method getDescription() -- Required method getParameters() -- Required method getTables() -- Required method executeV2() -- Appendix B. Introducing the Security Vulnerability Index -- So what is the IBM Global Services Vulnerability Index? -- How does it work? -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
Record Nr. UNINA-9910815714003321
Bucker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bücker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449871103321
Bücker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Deployment guide series [[electronic resource] ] : IBM Tivoli Security Compliance Manager / / Axel Buecker, Hendrik H. Fulda, Dieter Riexinger
Autore Bücker Axel
Edizione [1st ed.]
Pubbl/distr/stampa Austin, TX, : IBM International Technical Support Organization, 2005
Descrizione fisica xii, 196 p
Disciplina 005.8
Altri autori (Persone) FuldaHendrik H
RiexingerDieter
Collana Redbooks
Soggetto topico Electronic commerce - Security measures
Business enterprises - Computer networks - Access control
Computer networks - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783526503321
Bücker Axel  
Austin, TX, : IBM International Technical Support Organization, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui