|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn858431569 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
031001s2002 xxua ob 001 0 eng d |
040 |
|
|
|a CNNAI
|b eng
|e pn
|c CNNAI
|d OCLCO
|d OCLCQ
|d OCLCA
|d OCLCF
|d CEF
|d CNCEN
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1100828596
|
020 |
|
|
|a 9780738425498
|
020 |
|
|
|a 0738425494
|
024 |
8 |
|
|a 0738425494
|
029 |
1 |
|
|a AU@
|b 000067099366
|
035 |
|
|
|a (OCoLC)858431569
|z (OCoLC)1100828596
|
050 |
|
4 |
|a TK5105.8885.W43
|b I43133 2002
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kovari, Peter.
|
245 |
1 |
0 |
|a IBM WebSphere V5.0 security /
|c by Peter Kovari [and others].
|
246 |
3 |
0 |
|a WebSphere V5.0 security
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a [United States] :
|b IBM Redbooks,
|c ©2002.
|
300 |
|
|
|a 1 online resource (xvi, 540 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a WebSphere handbook series
|
500 |
|
|
|a Title from overview page (viewed Sept. 25/09).
|
520 |
|
|
|a This IBM Redbook provides IT Architects, IT Specialists, application designers, application developers, application assemblers, application deployers and consultants with information necessary to design, develop and deploy secure e-business applications using WebSphere Application Server V5. Part 1, WebSphere security provides a detailed overview of WebSphere Application Server V5 Security. It starts with J2EE security, then goes into details about the modules and components of a J2EE enterprise application; it also covers programmatic security techniques. The last chapter in this part shows all the security-related administrative items in WebSphere Application Server V5. Part 2, End-to-end security offers details about end-to-end security solutions where WebSphere Application Server V5 is part of an enterprise solution. You will find an introduction to Patterns for e-business, in which security is in focus. A very important chapter in this part will discuss the integration between WebSphere Application Server V5 and Tivoli Access Manager. Finally, the Appendixes provide additional information related to chapters in the previous two parts and also describe the sample application available with the book.
|
542 |
|
|
|f Copyright © IBM Redbooks
|g 2002
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a WebSphere.*
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
830 |
|
0 |
|a WebSphere handbook series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738425494/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|