IBM websphere V5 :
Ramanujam, Vinodha
IBM websphere V5 : edge of network patterns / Vinodha Ramanujam, Byron Braswell. - North Castle : IBM, 2003 - 280 p. - Redbooks .
CONTENIDO
Part 1: Introduction to Patterns
Chapter 1. Patterns for e-business
Section 1.1. The Patterns for e-business layered asset model
Section 1.2. How to use the Patterns for e-business
Section 1.3. Summary
Chapter 2. Edge of network Runtime patterns for authorization and authentication
Section 2.1. Edge of network authorization and authentication
Section 2.2. The need for authorization and authentication
Section 2.3. Runtime node types and tiers
Section 2.4. Runtime patterns for authorization and authorization
Part 2: Runtime patterns: technology guidelines
Chapter 3. Tivoli Access Manager technology guidelines
Section 3.1. Tivoli Access Manager for e-business
Section 3.2. Web server security characteristics
Section 3.3. Tivoli Access Manager overview
Section 3.4. Tivoli Access Manager base components
Section 3.5. Tivoli Access Manager Blades
Section 3.6. Access control of Web content and applications
Section 3.7. Basic architectural principles
Section 3.8. Tivoli Access Manager component interactions
Section 3.9. Component configuration and placement
Chapter 4. Edge Components technology guidelines
Section 4.1. WebSphere Application Server Edge Components
Section 4.2. Caching Proxy
Section 4.3. Load Balancer
Part 3: Guidelines
Chapter 5. Common installation and configuration guidelines
Section 5.1. Common installation topics
Section 5.2. IBM Directory Server V4.1 on Windows 2000
Section 5.3. Tivoli Access Manager V4.1 on Windows 2000
Section 5.4. Caching Proxy V5 on Windows 2000
Section 5.5. Tivoli Access Manager Plug-in on Windows 2000
Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3
Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3
Section 5.8. Caching Proxy V5 for AIX V4.3.3
Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3
Section 5.10. Administration of the Caching Proxy and plug-in
Chapter 6. Sample authentication and authorization environment
Section 6.1. Sample scenario environment
Section 6.2. Access Manager Plug-in files and tools
Section 6.3. Sample scenario
0738427926
WEBSPHERE
INGENIERIA DEL SOFTWARE
ENTORNO DE DESARROLLO DE SOFTWARE
PATTERNS
WEBSPHERE V5
SOFTWARE DE APLICACION
004.42:004.738.52 R141
IBM websphere V5 : edge of network patterns / Vinodha Ramanujam, Byron Braswell. - North Castle : IBM, 2003 - 280 p. - Redbooks .
CONTENIDO
Part 1: Introduction to Patterns
Chapter 1. Patterns for e-business
Section 1.1. The Patterns for e-business layered asset model
Section 1.2. How to use the Patterns for e-business
Section 1.3. Summary
Chapter 2. Edge of network Runtime patterns for authorization and authentication
Section 2.1. Edge of network authorization and authentication
Section 2.2. The need for authorization and authentication
Section 2.3. Runtime node types and tiers
Section 2.4. Runtime patterns for authorization and authorization
Part 2: Runtime patterns: technology guidelines
Chapter 3. Tivoli Access Manager technology guidelines
Section 3.1. Tivoli Access Manager for e-business
Section 3.2. Web server security characteristics
Section 3.3. Tivoli Access Manager overview
Section 3.4. Tivoli Access Manager base components
Section 3.5. Tivoli Access Manager Blades
Section 3.6. Access control of Web content and applications
Section 3.7. Basic architectural principles
Section 3.8. Tivoli Access Manager component interactions
Section 3.9. Component configuration and placement
Chapter 4. Edge Components technology guidelines
Section 4.1. WebSphere Application Server Edge Components
Section 4.2. Caching Proxy
Section 4.3. Load Balancer
Part 3: Guidelines
Chapter 5. Common installation and configuration guidelines
Section 5.1. Common installation topics
Section 5.2. IBM Directory Server V4.1 on Windows 2000
Section 5.3. Tivoli Access Manager V4.1 on Windows 2000
Section 5.4. Caching Proxy V5 on Windows 2000
Section 5.5. Tivoli Access Manager Plug-in on Windows 2000
Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3
Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3
Section 5.8. Caching Proxy V5 for AIX V4.3.3
Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3
Section 5.10. Administration of the Caching Proxy and plug-in
Chapter 6. Sample authentication and authorization environment
Section 6.1. Sample scenario environment
Section 6.2. Access Manager Plug-in files and tools
Section 6.3. Sample scenario
0738427926
WEBSPHERE
INGENIERIA DEL SOFTWARE
ENTORNO DE DESARROLLO DE SOFTWARE
PATTERNS
WEBSPHERE V5
SOFTWARE DE APLICACION
004.42:004.738.52 R141