My Cart
Bookstore Sign In
Books
Advertising
Art
Biographies & Memoirs
Business & Economics
Business & Investing
Cards, Greeting Cards, Card Decks
Children's
Constitution
Education
Entertainment
Family
Film Production
Fitness & Nutrition Journals
Food & Wine
Grief & Bereavement
Health, Mind & Body
History
Literature & Fiction
Mathematics
Music
Reference
Religion & Spirituality
Self Help
Self-Improvement
Sports
CDs & DVDs
Constitution
Publishing Samples
Technical Manuals
Altova
IBM Redbooks
Juniper Networks
Menu
IBM Host Integration In a Secure Network: A Practical Approach
IBM Redbooks
ADD TO CART
By their very nature, e-business applications are more vulnerable to attack than any type of previous I/T system. Security needs to be at the heart of these systems because the costs of getting it wrong can be enormous. The publicity associated with a breach of security reduces customer, supplier and Business Partner confidence in the enterprise and the share price plummets. There also may be actual monetary theft, or confidential information might be compromised. Whatever the details, the result is a loss to the business, and in the extreme case, the loss of the business itself.
Appropriate security needs to be in place for all systems - whether they are simply company Web pages with no access to the company intranet at all, or full-blown customer-to-business or business-to-business systems with external customers or partners having access to company systems. In this redbook, we show some of the best security solutions in which IBM Host Integration can operate.
Network security is implemented to protect two objects: (1) the data that is transmitted on the network, and (2) the computers that are connected to the network. This Redbook is directed at I/T managers and architects planning for, or implementing, an IBM Host Integration solution. It explores aspects of network security while implementing an IBM Web-to-host host integration solution, consisting of IBM WebSphere Host On-Demand and IBM WebSphere Host Publisher. It describes the native security capabilities of each product and how they may be used by themselves and with other network security products to provide a secure environment.
Price:
$48.00
Pages:
294
Date Published:
July 26, 2001
ISBN:
0738419303
Author:
IBM Redbooks
Product Number:
SG24-5988-00
Ships in 3-5 days
ADD TO CART
X Close
Why Vervante?
© 2025 Vervante Corporation. All rights reserved.