000 | 03039nam a2200337 a 4500 | ||
---|---|---|---|
999 |
_c11854 _d11854 |
||
003 | AR-sfUTN | ||
008 | 170717s2003 ||||| |||| 00| 0 eng d | ||
020 | _a0738427926 | ||
040 | _cAR-sfUTN | ||
041 | _aeng | ||
080 |
_a004.42:004.738.52 R141 _22000 |
||
100 | 1 |
_aRamanujam, Vinodha _910005 |
|
245 | 1 | 0 |
_aIBM websphere V5 : _bedge of network patterns / _cVinodha Ramanujam, Byron Braswell. |
260 |
_aNorth Castle : _bIBM, _c2003 |
||
300 | _a280 p. | ||
336 |
_2rdacontent _atexto _btxt |
||
337 |
_2rdamedia _asin mediaciĆ³n _bn |
||
338 |
_2rdacarrier _avolumen _bnc |
||
490 | _aRedbooks | ||
505 | 8 | 0 | _aCONTENIDO Part 1: Introduction to Patterns Chapter 1. Patterns for e-business Section 1.1. The Patterns for e-business layered asset model Section 1.2. How to use the Patterns for e-business Section 1.3. Summary Chapter 2. Edge of network Runtime patterns for authorization and authentication Section 2.1. Edge of network authorization and authentication Section 2.2. The need for authorization and authentication Section 2.3. Runtime node types and tiers Section 2.4. Runtime patterns for authorization and authorization Part 2: Runtime patterns: technology guidelines Chapter 3. Tivoli Access Manager technology guidelines Section 3.1. Tivoli Access Manager for e-business Section 3.2. Web server security characteristics Section 3.3. Tivoli Access Manager overview Section 3.4. Tivoli Access Manager base components Section 3.5. Tivoli Access Manager Blades Section 3.6. Access control of Web content and applications Section 3.7. Basic architectural principles Section 3.8. Tivoli Access Manager component interactions Section 3.9. Component configuration and placement Chapter 4. Edge Components technology guidelines Section 4.1. WebSphere Application Server Edge Components Section 4.2. Caching Proxy Section 4.3. Load Balancer Part 3: Guidelines Chapter 5. Common installation and configuration guidelines Section 5.1. Common installation topics Section 5.2. IBM Directory Server V4.1 on Windows 2000 Section 5.3. Tivoli Access Manager V4.1 on Windows 2000 Section 5.4. Caching Proxy V5 on Windows 2000 Section 5.5. Tivoli Access Manager Plug-in on Windows 2000 Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3 Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3 Section 5.8. Caching Proxy V5 for AIX V4.3.3 Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3 Section 5.10. Administration of the Caching Proxy and plug-in Chapter 6. Sample authentication and authorization environment Section 6.1. Sample scenario environment Section 6.2. Access Manager Plug-in files and tools Section 6.3. Sample scenario |
650 | _aWEBSPHERE | ||
650 | _aINGENIERIA DEL SOFTWARE | ||
650 | _aENTORNO DE DESARROLLO DE SOFTWARE | ||
650 | _aPATTERNS | ||
650 | _aWEBSPHERE V5 | ||
650 | _aSOFTWARE DE APLICACION | ||
700 | 1 | _aBraswell, Byron | |
942 |
_cBK _2udc |