Cargando…

Securing access to CICS within an SOA /

With the emergence of service-oriented architecture (SOA), the options for accessing the existing IBM Customer Information Control System (CICS) assets have become more varied than ever. With this variety comes the complexity of securing these assets. This IBM Redbooks publication is intended for IT...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Rayns, Chris (Autor), Delmenico, Tony (Autor), Havercan, Peter (Autor), Rees, Mary (Autor), Webb, Steven (Autor), Weiss, Rob (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States?] : IBM, International Technical Support Organization, 2006.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1351474735
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 221122s2006 xxua ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
020 |z 9780738496719 
035 |a (OCoLC)1351474735 
037 |a 0738496715  |b O'Reilly Media 
050 4 |a QA76.9.C55  |b S368 2006eb 
082 0 4 |a 004.6  |2 23/eng/20221122 
049 |a UAMI 
100 1 |a Rayns, Chris,  |e author. 
245 1 0 |a Securing access to CICS within an SOA /  |c Chris Rayns, Tony Delmenico, Peter Havercan, Mary Rees, Steven Webb, Rob Weiss. 
264 1 |a [United States?] :  |b IBM, International Technical Support Organization,  |c 2006. 
300 |a 1 online resource (272 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IBM redbooks 
504 |a Includes bibliographical references and index. 
520 |a With the emergence of service-oriented architecture (SOA), the options for accessing the existing IBM Customer Information Control System (CICS) assets have become more varied than ever. With this variety comes the complexity of securing these assets. This IBM Redbooks publication is intended for IT architects who are involved in the process of selecting, planning, and designing a secure SOA solution that makes use of CICS assets. This book introduces SOA and the options available for transforming CICS assets into SOA solutions. It then discusses the principles of security, followed by the different security technologies. The book then reviews each technology individually, discussing the security options that are available, the security architectures such as basic authentication, firewalls, and the use of Secure Sockets Layer (SSL) and public key infrastructure (PKI). 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Client/server computing. 
650 0 |a CICS (Computer system) 
650 0 |a Service-oriented architecture (Computer science) 
650 0 |a Web services. 
650 0 |a Computer network architectures. 
650 6 |a Architecture client-serveur (Informatique) 
650 6 |a CICS (Système informatique) 
650 6 |a Architecture orientée service (Informatique) 
650 6 |a Services Web. 
650 6 |a Réseaux d'ordinateurs  |x Architectures. 
650 7 |a CICS (Computer system)  |2 fast 
650 7 |a Client/server computing  |2 fast 
650 7 |a Computer network architectures  |2 fast 
650 7 |a Service-oriented architecture (Computer science)  |2 fast 
650 7 |a Web services  |2 fast 
700 1 |a Delmenico, Tony,  |e author. 
700 1 |a Havercan, Peter,  |e author. 
700 1 |a Rees, Mary,  |e author. 
700 1 |a Webb, Steven,  |e author. 
700 1 |a Weiss, Rob,  |e author. 
776 0 8 |i Print version:  |t Securing access to CICS within an SOA.  |b 2nd ed.  |d [United States?] : IBM, International Technical Support Organization, 2006  |z 0738496715  |w (DLC) 2007281032  |w (OCoLC)181424227 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738496715/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP