Cargando…

IBM WebSphere application server v7.0 secruity : secure your WebSphere applications with Java EE and JAAS security standards /

Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Siliceo, Omar
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham [UK] : Packt Pub./Enterprise, 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn712649355
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110414s2011 enka o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d E7B  |d UMI  |d OCLCQ  |d COO  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d DKDLA  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d OCLCO  |d JBG  |d LOA  |d OCLCF  |d AGLDB  |d COCUF  |d CNNOR  |d MOR  |d PIFAG  |d OCLCQ  |d U3W  |d OCLCO  |d OCL  |d BRL  |d STF  |d WRM  |d VTS  |d CEF  |d INT  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCQ  |d UAB  |d A6Q  |d OCLCQ  |d M8D  |d HS0  |d ADU  |d VLY  |d OCLCO  |d OCLCQ 
019 |a 741364934  |a 961563537  |a 962681745  |a 968286478  |a 974670824  |a 974769596  |a 981864204  |a 988492578  |a 992112144  |a 1005952756  |a 1018022722  |a 1037453285  |a 1038651405  |a 1053604433  |a 1055384371  |a 1081227087  |a 1083471700  |a 1083592468  |a 1083605657  |a 1100833507  |a 1103250217  |a 1112852041  |a 1129365314  |a 1153052812  |a 1162425154  |a 1241883919  |a 1274131638  |a 1274139492  |a 1290073969  |a 1300673058 
020 |a 9781849681490  |q (electronic bk.) 
020 |a 184968149X  |q (electronic bk.) 
020 |a 1849681481 
020 |a 9781849681483 
020 |z 9781849681483 
020 |a 1283016133 
020 |a 9781283016131 
020 |a 9786613016133 
020 |a 6613016136 
029 1 |a AU@  |b 000050964153 
029 1 |a DEBBG  |b BV043133288 
029 1 |a DEBSZ  |b 368477908 
029 1 |a DEBSZ  |b 372805175 
029 1 |a DEBSZ  |b 421626275 
029 1 |a NZ1  |b 14256037 
029 1 |a DKDLA  |b 820120-katalog:999931644205765 
035 |a (OCoLC)712649355  |z (OCoLC)741364934  |z (OCoLC)961563537  |z (OCoLC)962681745  |z (OCoLC)968286478  |z (OCoLC)974670824  |z (OCoLC)974769596  |z (OCoLC)981864204  |z (OCoLC)988492578  |z (OCoLC)992112144  |z (OCoLC)1005952756  |z (OCoLC)1018022722  |z (OCoLC)1037453285  |z (OCoLC)1038651405  |z (OCoLC)1053604433  |z (OCoLC)1055384371  |z (OCoLC)1081227087  |z (OCoLC)1083471700  |z (OCoLC)1083592468  |z (OCoLC)1083605657  |z (OCoLC)1100833507  |z (OCoLC)1103250217  |z (OCoLC)1112852041  |z (OCoLC)1129365314  |z (OCoLC)1153052812  |z (OCoLC)1162425154  |z (OCoLC)1241883919  |z (OCoLC)1274131638  |z (OCoLC)1274139492  |z (OCoLC)1290073969  |z (OCoLC)1300673058 
037 |a CL0500000097  |b Safari Books Online 
050 4 |a TK5105.8885.W43  |b S55 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Siliceo, Omar. 
245 1 0 |a IBM WebSphere application server v7.0 secruity :  |b secure your WebSphere applications with Java EE and JAAS security standards /  |c Omar Siliceo. 
260 |a Birmingham [UK] :  |b Packt Pub./Enterprise,  |c 2011. 
300 |a 1 online resource (viii, 290 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
588 0 |a Print version record. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view 
505 8 |a WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice 
505 8 |a Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console 
505 8 |a Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories 
505 8 |a AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources 
520 |a Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a WebSphere. 
630 0 7 |a WebSphere.  |2 blmlsh 
630 0 7 |a WebSphere.  |2 fast  |0 (OCoLC)fst01393856 
650 0 |a Electronic commerce  |x Security measures. 
650 0 |a Web servers  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Commerce électronique  |x Sécurité  |x Mesures. 
650 6 |a Serveurs Web  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Electronic commerce  |x Security measures.  |2 fast  |0 (OCoLC)fst00906919 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Siliceo, Omar.  |t IBM WebSphere application server v7.0 secruity.  |d Birmingham, [U.K.] : Packt Pub./Open Source, 2011  |z 9781849681483 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10450980 
938 |a EBSCOhost  |b EBSC  |n 358696 
994 |a 92  |b IZTAP