© Copyright IBM Corp. 2003. All rights reserved. 199
Related publicationsThe publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this redbook.
IBM Redbooks
For information on ordering these publications, see “How to get IBM Redbooks”
on page 200. Note that some of the documents referenced here may be available
in softcopy only:
All About IBM Tivoli Configuration Manager
, SG24-6612
All About Tivoli Management Agents
, SG24-5134
Check Point FireWall-1 on AIX: A Cookbook for Stand-Alone and High
Availability
, SG24-5492
Implementing Tivoli Remote Control in Large Enterprises
, SG24-5125
A Secure Way to Protect Your Network: IBM SecureWay Firewall for AIX
Vers ion 4.1
, SG24-5855
Tivoli Enterprise Internals and Problem Determination
, SG24-2034
Tivoli Enterprise Management Across Firewalls
, SG24-5510
Other publications
These publications are also relevant as further information sources:
IBM Tivoli Remote Control Release Notes
, SC23-4844
IBM Tivoli Remote Control User’s Guide
, SC23-4842
Firewall Security Toolbox User ’s Guide
, GC23-4826
Tivoli Management Framework Planning for Deployment Guide
, GC32-0803
TME 10 Enterprise Console Adapters Gu ide 3.7
TME 10 Event Integration Facility User’s Guide 3.7
Cheswick, et al,
Firewalls and Internet Security: Repelling the Wily Hacker
,
Addison-Wesley, 1994, ISBN 0201633574
Stevens,
TCP/IP Illustrated Volume I: The Protocols
, Addison-Wesley, 1993,
ISBN 0201633469