| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910783566503321 |
|
|
Autore |
Wunderlich Holger |
|
|
Titolo |
WebSphere application server for z/OS V5 and J2EE 1.3 security handbook [[electronic resource] /] / Steve Allison ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Poughkeepsie, N.Y., : IBM Corp., International Technical Support Organization, c2005 |
|
|
|
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxx, 742 p. ) : ill |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Web servers - Security measures |
Java (Computer program language) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"This edition applies to Versions 5 and 5.1 of IBM WebSphere Application Server for z/OS and OS/390." |
"June 2005." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
What do you think of when someone mentions z/OS security? Probably of something that is trustworthy, or even impenetrable. Perhaps you also think of something that is a little complex and challenging to administer. What comes to mind when someone mentions Internet security? Perhaps you think of prominent Web sites that have been maliciously "hacked" or credit card numbers that have been stolen. Using working examples of code and configuration files, in this IBM Redbooks publication, we explain how you can run your Web-enabled applications with as high a level of security as other z/OS applications and subsystems, even if those applications were written or originally deployed on another platform, by using the Java 2 Platform Enterprise Edition (J2EE) programming model and IBM WebSphere Application Server for z/OS and OS/390. This book will help architects, application programmers, WebSphere and security administrators, and application and network architects to understand and use these products. Please note that the additional material referenced in the text is not available from IBM. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910967232103321 |
|
|
Autore |
Bose Mandakranta <1938-, > |
|
|
Titolo |
Women in the Hindu tradition : rules, roles, and exceptions / / Mandakranta Bose |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Abingdon ; ; New York : , : Routledge, , 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-135-19258-8 |
1-135-19259-6 |
1-282-57618-6 |
9786612576188 |
0-203-86419-0 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (185 p.) |
|
|
|
|
|
|
Collana |
|
Routledge Hindu studies series |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Women - Religious aspects - Hinduism |
Women in Hinduism |
Hindu goddesses |
Hinduism - Doctrines |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Book Cover; Title; Copyright; Contents; Series editor foreword; Acknowledgements; Abbreviations; 1 Introduction; 2 Gendered divinity; 3 Shaping women's lives; 4 Women poets of Hinduism; 5 Sanctuary; 6 Conclusion; Bibliography; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book accounts for the origin and evolution of the nature and roles of women within the Hindu belief system. It explains how the idea of the goddess has been derived from Hindu philosophical ideas and texts of codes of conduct and how particular models of conduct for mortal women have been created. Hindu religious culture correlates philosophical speculation and social imperatives to situate femininity on a continuum from divine to mortal existence. This creates in the Hindu consciousness multiple - often contradictory - images of women, both as wielders and subjects of authority. The |
|
|
|
|
|
|
|
| |