01475nam a2200385Ia 4500001001200000003000800012006001900020007001500039008004100054010001700095020001500112040002100127035002000148050003100168082001400199245008300213250001200296260007200308300002600380490001700406500001800423500002000441504005100461533015200512630001700664630001800681650006400699655002900763700002100792710009600813710001700909830001800926856012600944999001901070ebr10112993CaPaEBRm u cr cn|||||||||041227s2004 xxua sb 001 0 eng d z 2004559797 z0738498467 aCaPaEBRcCaPaEBR a(OCoLC)6144760814aHF5548.4.L692bL693 2004eb04a005.822200aLotus security handbookh[electronic resource] /cWilliam Tworek ... [et al.]. a1st ed. a[S.l.] :bIBM, International Technical Support Organization,c2004. axviii, 698 p. :bill.1 aIBM redbooks a"April 2004." a"SG24-7017-00." aIncludes bibliographical references and index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries.00aLotus Notes.00aLotus Domino. 0aBusiness enterprisesxComputer networksxSecurity measures. 7aElectronic books.2local1 aTworek, William.2 aInternational Business Machines Corporation.bInternational Technical Support Organization.2 aebrary, Inc. 0aIBM redbooks.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10112993zAn electronic book accessible through the World Wide Web; click to view c106699d106699