|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn712649355 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110414s2011 enka o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d E7B
|d UMI
|d OCLCQ
|d COO
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d DKDLA
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d AZK
|d OCLCO
|d JBG
|d LOA
|d OCLCF
|d AGLDB
|d COCUF
|d CNNOR
|d MOR
|d PIFAG
|d OCLCQ
|d U3W
|d OCLCO
|d OCL
|d BRL
|d STF
|d WRM
|d VTS
|d CEF
|d INT
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UAB
|d A6Q
|d OCLCQ
|d M8D
|d HS0
|d ADU
|d VLY
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 741364934
|a 961563537
|a 962681745
|a 968286478
|a 974670824
|a 974769596
|a 981864204
|a 988492578
|a 992112144
|a 1005952756
|a 1018022722
|a 1037453285
|a 1038651405
|a 1053604433
|a 1055384371
|a 1081227087
|a 1083471700
|a 1083592468
|a 1083605657
|a 1100833507
|a 1103250217
|a 1112852041
|a 1129365314
|a 1153052812
|a 1162425154
|a 1241883919
|a 1274131638
|a 1274139492
|a 1290073969
|a 1300673058
|
020 |
|
|
|a 9781849681490
|q (electronic bk.)
|
020 |
|
|
|a 184968149X
|q (electronic bk.)
|
020 |
|
|
|a 1849681481
|
020 |
|
|
|a 9781849681483
|
020 |
|
|
|z 9781849681483
|
020 |
|
|
|a 1283016133
|
020 |
|
|
|a 9781283016131
|
020 |
|
|
|a 9786613016133
|
020 |
|
|
|a 6613016136
|
029 |
1 |
|
|a AU@
|b 000050964153
|
029 |
1 |
|
|a DEBBG
|b BV043133288
|
029 |
1 |
|
|a DEBSZ
|b 368477908
|
029 |
1 |
|
|a DEBSZ
|b 372805175
|
029 |
1 |
|
|a DEBSZ
|b 421626275
|
029 |
1 |
|
|a NZ1
|b 14256037
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999931644205765
|
035 |
|
|
|a (OCoLC)712649355
|z (OCoLC)741364934
|z (OCoLC)961563537
|z (OCoLC)962681745
|z (OCoLC)968286478
|z (OCoLC)974670824
|z (OCoLC)974769596
|z (OCoLC)981864204
|z (OCoLC)988492578
|z (OCoLC)992112144
|z (OCoLC)1005952756
|z (OCoLC)1018022722
|z (OCoLC)1037453285
|z (OCoLC)1038651405
|z (OCoLC)1053604433
|z (OCoLC)1055384371
|z (OCoLC)1081227087
|z (OCoLC)1083471700
|z (OCoLC)1083592468
|z (OCoLC)1083605657
|z (OCoLC)1100833507
|z (OCoLC)1103250217
|z (OCoLC)1112852041
|z (OCoLC)1129365314
|z (OCoLC)1153052812
|z (OCoLC)1162425154
|z (OCoLC)1241883919
|z (OCoLC)1274131638
|z (OCoLC)1274139492
|z (OCoLC)1290073969
|z (OCoLC)1300673058
|
037 |
|
|
|a CL0500000097
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.8885.W43
|b S55 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Siliceo, Omar.
|
245 |
1 |
0 |
|a IBM WebSphere application server v7.0 secruity :
|b secure your WebSphere applications with Java EE and JAAS security standards /
|c Omar Siliceo.
|
260 |
|
|
|a Birmingham [UK] :
|b Packt Pub./Enterprise,
|c 2011.
|
300 |
|
|
|a 1 online resource (viii, 290 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: A Threefold View of WebSphere Application Server Security; Enterprise Application-Server infrastructure architecture view; Simple infrastructure architecture characteristics; Branded infrastructure elements; Generic infrastructure components; Using the infrastructure architecture view; WebSphere architecture view; WebSphere Application Server simplified architecture; WebSphere node component; WebSphere JVM component; Using the WebSphere architecture view
|
505 |
8 |
|
|a WebSphere technology stack viewOS platform security; Java technology security; WebSphere security; Using the technology stack view; Summary; Chapter 2: Securing the Administrative Interface; Information needed: planning for security; The LDAP and security table; Enabling security; Setting the domain name; Starting at the Console; Continuing with the global security page; Onto the SSO page; Setting the SSO domain name; Applying and saving your changes; Configuring the user registry; Locating the user registry configuration area; Registry type selection; LDAP-the preferred choice
|
505 |
8 |
|
|a Reviewing the resulting Standalone LDAP registry pageDefining the WebSphere administrative ID; Setting the type of LDAP server; Entering the LDAP server parameters; Providing the LDAP bind identity parameters; Confirming other miscellaneous LDAP server parameters; Applying and saving the standalone LDAP configuration; Confirming the configuration; Enabling the administrative security; Locating the administrative security section; Performing the administrative security configuration steps; Applying and saving your changes; Propagating new configuration; Logging off from the console
|
505 |
8 |
|
|a Restarting the deployment managerLogging in to the deployment manager console; Administrative roles; Disabling security; Summary; Chapter 3: Configuring User Authentication and Access; Security domains; What is a security domain?; Scope of security domains; Benefits of multiple security domains; Limitations of security domains; Administrative security domain; Configuring security domains based on global security; Creating a global security domain clone; Creating a security domain using scripting; User registry concepts; What is a user registry?; WebSphere use of user repositories
|
505 |
8 |
|
|a AuthenticationAuthorization; Supported user registry types; Local operating system; Stand alone LDAP; Standalone custom registry; Federated repositories; Protecting application servers; WebSphere environment assumptions; Prerequisites; Creating an application server; Creating a virtual host; Creating application JDBC Provider and DataSource; Configuring the global security to use the federated user registry; Creating a security domain for the application server; Configuring user authentication; Creating groups; Creating users; Assigning users to groups; Configuring access to resources
|
520 |
|
|
|a Secure your IBM WebSphere applications with Java EE and JAAS security standards using this book and eBook.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a WebSphere.
|
630 |
0 |
7 |
|a WebSphere.
|2 blmlsh
|
630 |
0 |
7 |
|a WebSphere.
|2 fast
|0 (OCoLC)fst01393856
|
650 |
|
0 |
|a Electronic commerce
|x Security measures.
|
650 |
|
0 |
|a Web servers
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Commerce électronique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Serveurs Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Electronic commerce
|x Security measures.
|2 fast
|0 (OCoLC)fst00906919
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|a Siliceo, Omar.
|t IBM WebSphere application server v7.0 secruity.
|d Birmingham, [U.K.] : Packt Pub./Open Source, 2011
|z 9781849681483
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=358696
|z Texto completo
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10450980
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 358696
|
994 |
|
|
|a 92
|b IZTAP
|