13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PrefaceThis <strong>IBM</strong> Redbook provides IT Architects, IT Specialists, application designers,application developers, application assemblers, application deployers andconsultants with information to design, develop and deploy secure e-businessapplications using <strong>WebSphere</strong> Application Server V5.Part 1, “<strong>WebSphere</strong> security” on page 19 provides a detailed overview of<strong>WebSphere</strong> Application Server V5 <strong>Security</strong>. It starts with J2EE security and goesinto details about the modules and components of a J2EE enterprise application;it also discusses programmatic security techniques. The last chapter of this partshows all the security related administrative items in <strong>WebSphere</strong> ApplicationServer V5.Part 2, “End-to-end security” on page 347 offers details about end-to-endsecurity solutions where <strong>WebSphere</strong> Application Server V5 is part of anenterprise solution. You will find an introduction to Patterns for e-business, inwhich security is in focus. A very important chapter in this part will discuss theintegration between <strong>WebSphere</strong> Application Server V5 and Tivoli AccessManager.The “Appendixes” on page 443 provide additional information related to chaptersfrom Part 1 and Part 2 and also describe the sample application available withthe book.© Copyright <strong>IBM</strong> Corp. 2002 xi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!