000 03039nam a2200337 a 4500
999 _c11854
_d11854
003 AR-sfUTN
008 170717s2003 ||||| |||| 00| 0 eng d
020 _a0738427926
040 _cAR-sfUTN
041 _aeng
080 _a004.42:004.738.52 R141
_22000
100 1 _aRamanujam, Vinodha
_910005
245 1 0 _aIBM websphere V5 :
_bedge of network patterns /
_cVinodha Ramanujam, Byron Braswell.
260 _aNorth Castle :
_bIBM,
_c2003
300 _a280 p.
336 _2rdacontent
_atexto
_btxt
337 _2rdamedia
_asin mediaciĆ³n
_bn
338 _2rdacarrier
_avolumen
_bnc
490 _aRedbooks
505 8 0 _aCONTENIDO Part 1: Introduction to Patterns Chapter 1. Patterns for e-business Section 1.1. The Patterns for e-business layered asset model Section 1.2. How to use the Patterns for e-business Section 1.3. Summary Chapter 2. Edge of network Runtime patterns for authorization and authentication Section 2.1. Edge of network authorization and authentication Section 2.2. The need for authorization and authentication Section 2.3. Runtime node types and tiers Section 2.4. Runtime patterns for authorization and authorization Part 2: Runtime patterns: technology guidelines Chapter 3. Tivoli Access Manager technology guidelines Section 3.1. Tivoli Access Manager for e-business Section 3.2. Web server security characteristics Section 3.3. Tivoli Access Manager overview Section 3.4. Tivoli Access Manager base components Section 3.5. Tivoli Access Manager Blades Section 3.6. Access control of Web content and applications Section 3.7. Basic architectural principles Section 3.8. Tivoli Access Manager component interactions Section 3.9. Component configuration and placement Chapter 4. Edge Components technology guidelines Section 4.1. WebSphere Application Server Edge Components Section 4.2. Caching Proxy Section 4.3. Load Balancer Part 3: Guidelines Chapter 5. Common installation and configuration guidelines Section 5.1. Common installation topics Section 5.2. IBM Directory Server V4.1 on Windows 2000 Section 5.3. Tivoli Access Manager V4.1 on Windows 2000 Section 5.4. Caching Proxy V5 on Windows 2000 Section 5.5. Tivoli Access Manager Plug-in on Windows 2000 Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3 Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3 Section 5.8. Caching Proxy V5 for AIX V4.3.3 Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3 Section 5.10. Administration of the Caching Proxy and plug-in Chapter 6. Sample authentication and authorization environment Section 6.1. Sample scenario environment Section 6.2. Access Manager Plug-in files and tools Section 6.3. Sample scenario
650 _aWEBSPHERE
650 _aINGENIERIA DEL SOFTWARE
650 _aENTORNO DE DESARROLLO DE SOFTWARE
650 _aPATTERNS
650 _aWEBSPHERE V5
650 _aSOFTWARE DE APLICACION
700 1 _aBraswell, Byron
942 _cBK
_2udc