Amazon cover image
Image from Amazon.com

IBM websphere V5 : edge of network patterns / Vinodha Ramanujam, Byron Braswell.

By: Contributor(s): Material type: TextTextLanguage: English Series: RedbooksPublication details: North Castle : IBM, 2003Description: 280 pContent type:
  • texto
Media type:
  • sin mediación
Carrier type:
  • volumen
ISBN:
  • 0738427926
Subject(s):
Contents:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Libros Libros Facultad Regional Santa Fe 004.42:004.738.52 R141 (Browse shelf(Opens below)) 4 8389

CONTENIDO
Part 1: Introduction to Patterns
Chapter 1. Patterns for e-business
Section 1.1. The Patterns for e-business layered asset model
Section 1.2. How to use the Patterns for e-business
Section 1.3. Summary
Chapter 2. Edge of network Runtime patterns for authorization and authentication
Section 2.1. Edge of network authorization and authentication
Section 2.2. The need for authorization and authentication
Section 2.3. Runtime node types and tiers
Section 2.4. Runtime patterns for authorization and authorization
Part 2: Runtime patterns: technology guidelines
Chapter 3. Tivoli Access Manager technology guidelines
Section 3.1. Tivoli Access Manager for e-business
Section 3.2. Web server security characteristics
Section 3.3. Tivoli Access Manager overview
Section 3.4. Tivoli Access Manager base components
Section 3.5. Tivoli Access Manager Blades
Section 3.6. Access control of Web content and applications
Section 3.7. Basic architectural principles
Section 3.8. Tivoli Access Manager component interactions
Section 3.9. Component configuration and placement
Chapter 4. Edge Components technology guidelines
Section 4.1. WebSphere Application Server Edge Components
Section 4.2. Caching Proxy
Section 4.3. Load Balancer
Part 3: Guidelines
Chapter 5. Common installation and configuration guidelines
Section 5.1. Common installation topics
Section 5.2. IBM Directory Server V4.1 on Windows 2000
Section 5.3. Tivoli Access Manager V4.1 on Windows 2000
Section 5.4. Caching Proxy V5 on Windows 2000
Section 5.5. Tivoli Access Manager Plug-in on Windows 2000
Section 5.6. IBM Directory Server 4.1 on AIX 4.3.3
Section 5.7. Tivoli Access Manager V4.1 on AIX 4.3.3
Section 5.8. Caching Proxy V5 for AIX V4.3.3
Section 5.9. Tivoli Access Manager Plug-in on AIX 4.3.3
Section 5.10. Administration of the Caching Proxy and plug-in
Chapter 6. Sample authentication and authorization environment
Section 6.1. Sample scenario environment
Section 6.2. Access Manager Plug-in files and tools
Section 6.3. Sample scenario

There are no comments on this title.

to post a comment.