|
|
|
|
LEADER |
02433nmm a2200349 u 4500 |
001 |
EB001919634 |
003 |
EBX01000000000000001082536 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0738428078
|
050 |
|
4 |
|a TK5105.8885.W43
|
100 |
1 |
|
|a Bücker, Axel
|
245 |
0 |
0 |
|a Enterprise business portals II with IBM tivoli access manager
|c Axel Bucker et al
|
260 |
|
|
|a San Jose, CA
|b IBM
|c 2003
|
300 |
|
|
|a xxii, 468 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references (pages 459-461) and index
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Portails (Informatique) / Sécurité / Mesures
|
653 |
|
|
|a Web portals / Security measures
|
700 |
1 |
|
|a Antonius, Jesper
|
700 |
1 |
|
|a Riexinger, Dieter
|
700 |
1 |
|
|a Sommer, Frank
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a IBM redbooks
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738428078/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 658.4/72
|
520 |
|
|
|a Mastering IBM Tivoli Access Manager is a very important factor in successfully deploying contemporary e-business solutions. Access Manager is the key element in an e-business security framework that needs thorough understanding to achieve maximum security, functionality, and performance. Based on expandable security policies for users, groups, and protected resources, Tivoli Access Manager manages authentication and authorization for application servers, Web sites, and virtually any other resource that requires protection, including custom-written applications. This IBM Redbooks publication describes how to build an integrated enterprise business portal with Tivoli Access Manager Version 4.1, WebSphere Portal, mySAP Workplace, and the SAP Enterprise Portal. It also describes how to implement a federated single sign-on solution within a Web Services scenario. This book is partitioned into general and customer scenario based sections. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized security infrastructure. Please note that the additional material referenced in the text is not available from IBM.
|