WebSphere Application Server for z/OS V5 and J2EE 1.3 Security Handbook
What do you think of when someone mentions z/OS security? Probably of something that is trustworthy, or even impenetrable. Perhaps you also think of something that is a little complex and challenging to administer.What comes to mind when someone mentions Internet security? Perhaps you think of promi...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | What do you think of when someone mentions z/OS security?
Probably of something that is trustworthy, or even impenetrable.
Perhaps you also think of something that is a little complex and
challenging to administer.What comes to mind when someone mentions Internet security?
Perhaps you think of prominent Web sites that have been maliciously
"hacked" or credit card numbers that have been stolen.Using working examples of code and configuration files, in this
IBM Redbooks publication, we explain how you can run your
Web-enabled applications with as high a level of security as other
z/OS applications and subsystems, even if those applications were
written or originally deployed on another platform, by using the
Java 2 Platform Enterprise Edition (J2EE) programming model and IBM
WebSphere Application Server for z/OS and OS/390.This book will help architects, application programmers,
WebSphere and security administrators, and application and network
architects to understand and use these products.Please note that the additional material referenced in the text is not available from IBM. |
---|