13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Applications have to be in sync with system security. However, sometimes theapplications require some flexibility on the security side; the reason can beunresolved design issues or special requirements. These cases can opensecurity holes or can weaken the system security if they are not monitored normaintained correctly.11.6 More information on Patterns for e-businessThe most valuable source of information about patterns is the book Patterns fore-business: A Strategy for Reuse by Jonathan Adams, George Galambos,Srinivas Koushik, and Guru Vasudeva, ISBN 1931182027.For more information about Access Integration security, refer to the following <strong>IBM</strong>Redbook: Applying the Patterns for e-business to Domino and <strong>WebSphere</strong>Scenarios, SG24-6255.For more information about Patterns for e-business, see the following Web site:http://www-106.ibm.com/developerworks/patternsOr refer to the following <strong>IBM</strong> Redbooks:► Applying the Patterns for e-business to Domino and <strong>WebSphere</strong> Scenarios,SG24-6255►►►►►►Self-Service Patterns using <strong>WebSphere</strong> Application Server V4.0, SG24-6175User-to-Business Pattern Using <strong>WebSphere</strong> Personalization Patterns fore-business Series, SG24-6213Self-Service applications using <strong>IBM</strong> <strong>WebSphere</strong> V4.0 and <strong>IBM</strong> MQSeriesIntegrator Patterns for e-business Series, SG24-6160e-commerce Patterns for Building B2C Web Sites, Using <strong>IBM</strong> <strong>WebSphere</strong>Commerce Suite V5.1, SG24-6180Access Integration Pattern using <strong>IBM</strong> <strong>WebSphere</strong> Portal Server, SG24-6267Mobile Applications with <strong>IBM</strong> <strong>WebSphere</strong> Everyplace Access Design andDevelopment, SG24-6259Chapter 11. <strong>Security</strong> in Patterns for e-business 367

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!