O'Reilly logo

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security by Serge Vereecke, Stefaan Van Daele, Gretchen Marx, Christian Mark, Mark Johnston, Vladimir Jeremic, Jaco Jacobs, Jan Flegr, Peter Brittenham, Martin Borrett, Brian Blackshaw, Saritha Arunkumar, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Related publications
The publications that are listed in this section are considered suitable for a more detailed discussion of the topics that are covered in this book.
IBM Redbooks
The following IBM Redbooks publications provide more information about the topic in this document. Some publications referenced in this list might be available in softcopy only.
Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014
IBM Security Solutions Architecture for Network, Server and Endpoint, SG24-7581
Security in Development: The IBM Secure Engineering Framework, REDP-4641
You can search for, view, download, or order these documents and other Redbooks, Redpapers, Web Docs, draft and additional materials, at the following website: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required