The Open Group Library

Guides

The Open Group Guides are supporting documents. They provide advice and best practice on using and/or adopting Open Group standards and other standards.

Set Descending Direction

11-20 of 117

  1. Single UNIX® Specification, Authorized Guide to Version 3

    A Guide to the Single UNIX Specification Version 3, including what's new in Version 3 (Second Edition).
    Learn More
  2. Introduction to Security Design Patterns

    This Guide introduces the pattern-based security design methodology and approach to software architecture...
    Learn More
  3. Guide to Digital Rights Management

    This Guide provides an introduction to some of the key concepts and technologies relating to Digital Rights Management (DRM).
    Learn More
  4. Framework for Control over Electronic Chattel Paper

    This Guide provides a framework for analyzing when and if a party is able to show 'control' over electronic chattel paper (ECP) pursuant to UCC Section 9-105.
    Learn More
  5. S/MIME Secure Messaging Architecture

    This document offers a high-level description of the S/MIME Secure Messaging Architecture.
    Learn More
  6. Core Identifier Framework Matrix

    This document is the Core Identifier Framework Matrix. It provides a reference point for identifier classifications, and provides a basis for the selection of a Core Identifier Form for a global standard common core identifier.
    Learn More
  7. Architectures for Identity Management

    This Guide addresses the key issues that an enterprise architect needs to consider in the process of developing an enterprise identity management architecture, and discusses practical aspects which influence decision-making during that process.
    Learn More
  8. Requirements for Risk Assessment Methodologies

    This Guide is the second of an initial set of three Open Group publications addressing Risk Management.
    Learn More
  9. TOGAF® Version 9: A Pocket Guide

    This Pocket Guide is based on TOGAF Version 9 Enterprise Edition.
    Learn More
  10. Jericho Forum® Self-Assessment Scheme

    This Self-Assessment Scheme is designed to assess how effectively a given information security product or solution meets the criteria implicit in the Jericho Forum Commandments.
    Learn More

Set Descending Direction

11-20 of 117