IBM WebSphere V5 Edge of Network Patterns

TOP : WebSphere

IBM WebSphere V5 Edge of Network Patterns

Security is such a fundamental enabler of e-busines that in the emerging business-to-consumer (B2C) and business-to-business (B2B) markets, effective security can make the difference betwen being successful and becoming an "also ran". The promise of e-business and its ability to create new revenue streams is predicated on the ability of these new business processes to reach these new markets and customers. That promise can evaporate if security issues are not addressed up front.

This IBM Redbook addresses the security issues of user authentication and authorization using the concept of Patterns. Patterns for e-business are a group of proven, reusable assets that can help speed the process of developing applications.

In this redbook, we describe guidelines and options for the selection of Runtime patterns that include user authentication and authorization considerations in the design process. Specifically, we address software and node configuration scenarios within the demilitarized zone (DMZ) and give examples of implementation procedures.
Price: $50.00 $40.00
Pages: 292
Date Published: August 15, 2003
ISBN: 0738427926
Author: IBM Redbooks
Product Number: SG24-6896-00
Ships in 3-5 days
Return to category
Why Vervante?

© 2024 Vervante Corporation. All rights reserved.