03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preface<br />

This <strong>IBM</strong> Redbook provides IT Architects, IT Specialists, application designers,<br />

application developers, application assemblers, application deployers and<br />

consultants with information to design, develop and deploy secure e-business<br />

applications using <strong>WebSphere</strong> Application Server V5.<br />

Part 1, “<strong>WebSphere</strong> security” on page 19 provides a detailed overview of<br />

<strong>WebSphere</strong> Application Server V5 <strong>Security</strong>. It starts with J2EE security and goes<br />

into details about the modules and components of a J2EE enterprise application;<br />

it also discusses programmatic security techniques. The last chapter of this part<br />

shows all the security related administrative items in <strong>WebSphere</strong> Application<br />

Server V5.<br />

Part 2, “End-to-end security” on page 347 offers details about end-to-end<br />

security solutions where <strong>WebSphere</strong> Application Server V5 is part of an<br />

enterprise solution. You will find an introduction to Patterns for e-business, in<br />

which security is in focus. A very important chapter in this part will discuss the<br />

integration between <strong>WebSphere</strong> Application Server V5 and Tivoli Access<br />

Manager.<br />

The “Appendixes” on page 443 provide additional information related to chapters<br />

from Part 1 and Part 2 and also describe the sample application available with<br />

the book.<br />

© Copyright <strong>IBM</strong> Corp. 2002 xi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!