Imagen de cubierta local
Imagen de cubierta local

IBM websphere V5 : edge of network patterns / Vinodha Ramanujam, Byron Braswell.

Por: Colaborador(es): Idioma: Inglés Series RedbooksDetalles de publicación: North Castle : IBM, 2003Descripción: 280 pTipo de contenido:
  • texto
Tipo de medio:
  • sin mediación
Tipo de soporte:
  • volumen
ISBN:
  • 0738427926
Tema(s):
Contenidos:
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura topográfica Estado Fecha de vencimiento Código de barras Reserva de ítems
Libro Libro Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" 004.42:004.738.52 R141 (Navegar estantería(Abre debajo)) Sólo Consulta 8389
Total de reservas: 0

CONTENIDO
Part 1: Introduction to Patterns
Chapter 1. Patterns for e-business
Section 1.1. The Patterns for e-business layered asset model
Section 1.2. How to use the Patterns for e-business
Section 1.3. Summary
Chapter 2. Edge of network Runtime patterns for authorization and authentication
Section 2.1. Edge of network authorization and authentication
Section 2.2. The need for authorization and authentication
Section 2.3. Runtime node types and tiers
Section 2.4. Runtime patterns for authorization and authorization
Part 2: Runtime patterns: technology guidelines
Chapter 3. Tivoli Access Manager technology guidelines
Section 3.1. Tivoli Access Manager for e-business
Section 3.2. Web server security characteristics
Section 3.3. Tivoli Access Manager overview
Section 3.4. Tivoli Access Manager base components
Section 3.5. Tivoli Access Manager Blades
Section 3.6. Access control of Web content and applications
Section 3.7. Basic architectural principles
Section 3.8. Tivoli Access Manager component interactions
Section 3.9. Component configuration and placement
Chapter 4. Edge Components technology guidelines
Section 4.1. WebSphere Application Server Edge Components
Section 4.2. Caching Proxy
Section 4.3. Load Balancer
Part 3: Guidelines
Chapter 5. Common installation and configuration guidelines
Section 5.1. Common installation topics
Section 5.2. IBM Directory Server V4.1 on Windows 2000
Section 5.3. Tivoli Access Manager V4.1 on Windows 2000
Section 5.4. Caching Proxy V5 on Windows 2000
Section 5.5. Tivoli Access Manager Plug-in on Windows 2000
Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3
Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3
Section 5.8. Caching Proxy V5 for AIX V4.3.3
Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3
Section 5.10. Administration of the Caching Proxy and plug-in
Chapter 6. Sample authentication and authorization environment
Section 6.1. Sample scenario environment
Section 6.2. Access Manager Plug-in files and tools
Section 6.3. Sample scenario

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

Imagen de cubierta local