IBM websphere V5 : edge of network patterns / Vinodha Ramanujam, Byron Braswell.
Idioma: Inglés Series RedbooksDetalles de publicación: North Castle : IBM, 2003Descripción: 280 pTipo de contenido:- texto
- sin mediación
- volumen
- 0738427926
Tipo de ítem | Biblioteca actual | Signatura topográfica | Estado | Fecha de vencimiento | Código de barras | Reserva de ítems | |
---|---|---|---|---|---|---|---|
Libro | Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" | 004.42:004.738.52 R141 (Navegar estantería(Abre debajo)) | Sólo Consulta | 8389 |
Navegando Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" estanterías Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
004.42:004.738.52 M583 E.70-536 MCTS self-paced training kit (exam 70-536) : | 004.42:004.738.52 M583 E.70-547 MCPD self-paced training kit (exam 70-547) : | 004.42:004.738.52 P586 Using VisualAge for java enterprise version 2 to develop Corba and EJB applications / | 004.42:004.738.52 R141 IBM websphere V5 : | 004.42:004.738.52 R189 Rational application developer V6 programming guide / | 004.42:004.738.52 SA15 Websphere application server-express V5.0.2 administrator handbook / | 004.42:004.738.52 US2 User-to-business patterns using websphere advanced and MQSI : |
CONTENIDO
Part 1: Introduction to Patterns
Chapter 1. Patterns for e-business
Section 1.1. The Patterns for e-business layered asset model
Section 1.2. How to use the Patterns for e-business
Section 1.3. Summary
Chapter 2. Edge of network Runtime patterns for authorization and authentication
Section 2.1. Edge of network authorization and authentication
Section 2.2. The need for authorization and authentication
Section 2.3. Runtime node types and tiers
Section 2.4. Runtime patterns for authorization and authorization
Part 2: Runtime patterns: technology guidelines
Chapter 3. Tivoli Access Manager technology guidelines
Section 3.1. Tivoli Access Manager for e-business
Section 3.2. Web server security characteristics
Section 3.3. Tivoli Access Manager overview
Section 3.4. Tivoli Access Manager base components
Section 3.5. Tivoli Access Manager Blades
Section 3.6. Access control of Web content and applications
Section 3.7. Basic architectural principles
Section 3.8. Tivoli Access Manager component interactions
Section 3.9. Component configuration and placement
Chapter 4. Edge Components technology guidelines
Section 4.1. WebSphere Application Server Edge Components
Section 4.2. Caching Proxy
Section 4.3. Load Balancer
Part 3: Guidelines
Chapter 5. Common installation and configuration guidelines
Section 5.1. Common installation topics
Section 5.2. IBM Directory Server V4.1 on Windows 2000
Section 5.3. Tivoli Access Manager V4.1 on Windows 2000
Section 5.4. Caching Proxy V5 on Windows 2000
Section 5.5. Tivoli Access Manager Plug-in on Windows 2000
Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3
Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3
Section 5.8. Caching Proxy V5 for AIX V4.3.3
Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3
Section 5.10. Administration of the Caching Proxy and plug-in
Chapter 6. Sample authentication and authorization environment
Section 6.1. Sample scenario environment
Section 6.2. Access Manager Plug-in files and tools
Section 6.3. Sample scenario
No hay comentarios en este titulo.