My Cart
Bookstore Sign In
Books
Advertising
Art
Biographies & Memoirs
Business & Economics
Business & Investing
Cards, Greeting Cards, Card Decks
Children's
Constitution
Education
Entertainment
Family
Fitness & Nutrition Journals
Food & Wine
Grief & Bereavement
Health, Mind & Body
History
Literature & Fiction
Mathematics
Music
Reference
Religion & Spirituality
Self Help
Self-Improvement
Sports
CDs & DVDs
Constitution
Education
Food & Wine
Health, Mind & Body
Literature & Fiction
Music
Parenting & Families
Self-Improvement
Publishing Samples
Technical Manuals
Altova
IBM Redbooks
Juniper Networks
Menu
Lotus Security Handbook
IBM Redbooks
ADD TO CART
This IBM Redbook provides best practices and guidance for building a secure collaboration infrastructure utilizing IBM Lotus technologies. It is the third Lotus security oriented Redbook to be published. However, unlike the previous two Redbooks in this series, “The Domino Defense: Security in Lotus Notes 4.5 and the Internet” (SG24-4848) and “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), this third book focuses not just on Notes/Domino - but on all IBM Lotus collaborative products, as well as general security best practices for any infrastructure. This book should be considered essential reading for anyone responsible for Lotus technology based applications, systems, and infrastructures.
The book is broken into four main parts:
Part 1 introduces the basic concepts related to security, and then covers a number of methodologies for architecting and deploying security from beginning to end in an organization.
Part 2 delves into the specific concepts and components involved in a secure infrastructure. This includes discussions about security zoning, single sign-on (SSO), public key infrastructures (PKI), and directory strategies.
Part 3 discusses the specific security features in the latest versions of Lotus products. Detailed security features of Lotus Notes and Domino 6, Sametime 3, QuickPlace 2.08, Domino Web Access (iNotes), WebSphere Portal, and other IBM/Lotus collaborative technologies are all discussed.
Part 4 provides a real-life scenario demonstrating the secure implementation of Lotus collaborative technologies, following the guidelines and best practices provided in the first three parts of this Redbook.
It is assumed that the reader has a good understanding of the basic concepts involved with the Lotus Notes and Domino security model and a basic understanding of the principles of IT security. For a general overview of Notes and Domino security, the reader can refer to the IBM Redbook, “Lotus Notes and Domino R5.0 Security Infrastructure Revealed” (SG24-5341), available for download at:
http://www.redbooks.ibm.com/abstracts/sg245341.html
NOTE: Also available for download via the "additional material" link in the right-hand corner of this abstract page is the Microsoft PowerPoint presentation from the recent Redbooks Lotus Single Sign-On Solutions webcast, which was based on the SSO content from this Redbook.
Price:
$92.25
$73.00
Pages:
706
Date Published:
April 6, 2004
ISBN:
0738498467
Author:
IBM Redbooks
Product Number:
SG24-7017-00
Ships in 3-5 days
ADD TO CART
X Close
Why Vervante?
© 2024 Vervante Corporation. All rights reserved.