top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Host Access Client Package V4 update [[electronic resource] /] / [Byron Braswell ... et al.]
Host Access Client Package V4 update [[electronic resource] /] / [Byron Braswell ... et al.]
Edizione [3rd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xxviii, 1104 p. : ill
Disciplina 004.67/8
Altri autori (Persone) BraswellByron
Collana IBM redbooks
Soggetto topico Web servers - Computer programs
IBM computers - Programming
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450486303321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Host Access Client Package V4 update [[electronic resource] /] / [Byron Braswell ... et al.]
Host Access Client Package V4 update [[electronic resource] /] / [Byron Braswell ... et al.]
Edizione [3rd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xxviii, 1104 p. : ill
Disciplina 004.67/8
Altri autori (Persone) BraswellByron
Collana IBM redbooks
Soggetto topico Web servers - Computer programs
IBM computers - Programming
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783548003321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Host Access Client Package V4 update / / [Byron Braswell ... et al.]
Host Access Client Package V4 update / / [Byron Braswell ... et al.]
Edizione [3rd ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xxviii, 1104 p. : ill
Disciplina 004.67/8
Altri autori (Persone) BraswellByron
Collana IBM redbooks
Soggetto topico Web servers - Computer programs
IBM computers - Programming
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction to the Host Access Client Package -- 1.1 Host On-Demand -- 1.1.1 Host On-Demand features -- 1.1.2 Host On-Demand components -- 1.1.3 Architecture and operations -- 1.2 Introduction to Personal Communications -- 1.3 National Language Support -- 1.3.1 The need for National Language Support -- 1.3.2 Globalization demystified -- 1.3.3 Installation -- Part 1 IBM WebSphere Host On-Demand -- Chapter 2. Planning and installation -- 2.1 Supported platforms -- 2.2 Server requirements -- 2.2.1 zSeries platform -- 2.2.2 iSeries platform -- 2.2.3 Microsoft Windows platforms -- 2.2.4 AIX platform -- 2.2.5 Solaris platform -- 2.2.6 HP-UX platform -- 2.2.7 Linux and other UNIX platforms -- 2.2.8 OS/2 platform -- 2.2.9 Novell Netware platform -- 2.2.10 Supported LDAP servers -- 2.2.11 Development environments -- 2.2.12 Miscellaneous software -- 2.2.13 Support for Internet Protocol Version 6 -- 2.3 Client requirements -- 2.3.1 Supported operating systems -- 2.3.2 Supported Web browsers -- 2.4 Installing Host On-Demand -- 2.4.1 Installing on Windows, AIX, Linux, Solaris, and HP-UX -- 2.4.2 Installing on OS/2 -- 2.4.3 Installing on Novell NetWare -- 2.4.4 Installing on OS/400 -- 2.4.5 Installing on OS/390 or z/OS -- 2.4.6 Changing the Service Manager port -- 2.4.7 Installing the configuration servlet -- 2.4.8 Installing the locally installed client -- 2.4.9 Installing the Deployment Wizard -- 2.5 Migration considerations -- 2.5.1 Server considerations -- 2.5.2 Client considerations -- 2.5.3 Client migration problems -- 2.6 Removing Host On-Demand -- 2.6.1 zSeries -- 2.6.2 All other operating systems -- 2.7 Service updates -- Chapter 3. z/OS implementation -- 3.1 Planning.
3.1.1 Software requirements -- 3.1.2 DASD storage requirements -- 3.1.3 Backing up the private directory -- 3.1.4 Upgrade considerations -- 3.2 Host On-Demand installation -- 3.2.1 Installation jobs -- 3.2.2 Installation instructions -- 3.3 Activating Host On-Demand Service Manager -- 3.3.1 UNIX System Services environment -- 3.3.2 Security Server (RACF) considerations -- 3.3.3 HTTP server environment -- 3.3.4 Modify the HOMSERVR sample job -- 3.3.5 Start the Host On-Demand Service Manager -- 3.3.6 Changing the configuration port -- 3.3.7 Stopping the Service Manager -- 3.3.8 Considerations when running multiple TCP/IP stacks -- 3.3.9 Miscellaneous information -- 3.4 TN3270E contention-resolution function -- 3.5 Deployment Wizard considerations -- 3.5.1 Deployment Wizard files -- 3.6 Using SSL with Communications Server for z/OS -- 3.6.1 Telnet Server and SSL support -- 3.6.2 SSL encryption overview -- 3.6.3 SSL configuration using gskkyman -- 3.6.4 Certificate management using RACF -- 3.7 Certificate Express Logon -- 3.8 LDAP directory server -- 3.8.1 Schema installation -- 3.8.2 Directory tree -- 3.8.3 Performance considerations -- 3.9 Native Authentication -- 3.9.1 Installation of Native Authentication service -- 3.9.2 Starting Native Authentication service -- 3.9.3 Testing Native Authentication service -- Chapter 4. iSeries tips -- 4.1 Upgrading the JVM level to 1.3 -- 4.2 Using IBM HTTP Server (Powered by Apache) -- 4.3 Using Lotus Domino HTTP Server -- 4.3.1 Restarting the Domino HTTP Server -- 4.3.2 Using the Domino HTTP Server and Host On-Demand -- 4.4 Using the configuration servlet -- 4.5 Adding a printer definition table entry -- 4.6 Performance tips -- 4.6.1 Web page caching -- 4.6.2 Compile Host On-Demand for faster execution -- 4.7 iSeries as a target host -- 4.7.1 5250 Workstation ID -- 4.7.2 5250 Telnet dropout.
4.7.3 Tip for 5250 printing -- 4.7.4 Mapping a network drive to the iSeries -- 4.7.5 Unicode support for OS/400 -- 4.7.6 Additional iSeries-related Web pages -- Chapter 5. Clients -- 5.1 Host On-Demand default clients -- 5.1.1 Administration clients -- 5.1.2 Download clients -- 5.1.3 Cached clients -- 5.1.4 Emulator clients -- 5.1.5 Problem determination clients -- 5.2 Mac OS X clients -- 5.2.1 Overview of Mac OS X support -- 5.2.2 Planning for Mac OS clients -- 5.2.3 Scenario using a Mac OS X client -- 5.3 Componentization -- 5.4 Smart caching -- 5.5 Utility clients -- 5.5.1 New user client -- 5.5.2 Remove cached client -- 5.6 CICS Gateway client -- 5.7 Database On-Demand -- 5.8 The emulator session window -- 5.8.1 Operator information area -- 5.8.2 Customizing the toolbar -- 5.8.3 Color remapping -- 5.8.4 Keyboard remapping -- 5.9 Java 2 support -- 5.9.1 Features that take advantage of Java 2 -- 5.9.2 Terms defined -- 5.9.3 Improvements to the cached client for Java 2 -- 5.9.4 Look and feel with Java 2 version of Host On-Demand -- 5.10 Java 2 practical issues -- 5.10.1 Limitations and workarounds -- 5.10.2 Effects on system resources -- 5.10.3 Must I migrate my existing Deployment Wizard files? -- 5.10.4 What if I want to continue running Java 1 browsers only? -- 5.10.5 What if I am already running Java 2 enabled browsers? -- 5.10.6 What if I want to migrate my users to Java 2 enabled browsers? -- 5.11 Client Java type: Java 1, Java 2, or Autodetect -- 5.11.1 Overview -- 5.11.2 Java 1 client type -- 5.11.3 Java 2 client type -- 5.11.4 Autodetect client type -- 5.12 Effect of client Java type at startup -- 5.12.1 Messages -- 5.12.2 Startup behavior for Java 1 download client -- 5.12.3 Startup behavior for Java 2 download client -- 5.12.4 Startup behavior for Java 1 cached client -- 5.12.5 Startup behavior for Java 2 cached client.
5.13 Download client and cached-client implementation -- 5.13.1 HostOnDemand applet and CachedAppletSupport applet -- 5.13.2 How Host On-Demand component modules are stored -- 5.14 The Java 2 cached client -- 5.14.1 Java 2 cache options -- 5.14.2 Downloading a Java 2 component not on the preload list -- 5.14.3 Java 2 cached client does not interfere with download client -- 5.14.4 Java 2 cached client upgrades -- 5.14.5 Handling cached client components for Java 1 and Java 2 -- 5.14.6 Increased flexibility with Java 2 cached clients -- 5.14.7 Removing the cached client -- 5.15 The Java 2 download client -- 5.16 Web browsers: Java 1 and Java 2 enabled -- 5.16.1 Web browsers supported -- 5.16.2 Netscape Web browsers -- 5.16.3 Microsoft Web browsers: Internet Explorer -- 5.17 The Java 2 plug-in -- 5.17.1 Java 2 plug-ins supported -- 5.17.2 Clients can download Java 2 runtime for Win32 platform -- 5.18 Additional information -- 5.18.1 More information on the new Java 2 cache -- 5.18.2 More information on the cached client -- 5.18.3 More information on the download client -- 5.18.4 More information on launching the Host On-Demand applets -- Chapter 6. Database On-Demand -- 6.1 Administering Database On-Demand -- 6.1.1 Creating Database On-Demand groups and users -- 6.1.2 Configuring database options -- 6.1.3 Administering SQL statements -- 6.2 Using Database On-Demand -- 6.2.1 Creating a new SQL statement -- 6.2.2 Running an SQL statement -- 6.2.3 Changing an SQL statement -- 6.2.4 Deleting an SQL statement -- 6.2.5 Customizing user options -- 6.3 Installing and registering other JDBC drivers -- 6.3.1 Installing a driver -- 6.3.2 Registering a driver -- 6.3.3 Using a new driver -- 6.3.4 Common access problems -- Chapter 7. Administration -- 7.1 Managing users and groups -- 7.1.1 Planning -- 7.1.2 Managing groups -- 7.1.3 Creating a new user.
7.1.4 Using Native Authentication -- 7.1.5 Administering groups, sessions, and users -- 7.1.6 Filtering -- 7.1.7 Configuring sessions -- 7.1.8 Disabling functions -- 7.2 Services -- 7.3 Redirector service -- 7.3.1 Configuring the Redirector -- 7.3.2 Configuring emulator sessions to use the Redirector -- 7.4 Directory service -- 7.4.1 Use Directory Service (LDAP) -- 7.4.2 Migrate configuration to LDAP directory -- 7.5 OS/400 Proxy Server -- 7.6 License Use Management -- 7.6.1 Enabling License-Use Count -- 7.6.2 License Use Statistics -- 7.6.3 Disabling License-Use Count -- 7.7 Directory Utility -- 7.7.1 Using Directory Utility -- 7.7.2 The Directory Utility list action -- 7.7.3 General XML file syntax -- 7.7.4 Example -- 7.8 Java 2 considerations for iSeries -- Chapter 8. LDAP directory server -- 8.1 LDAP overview -- 8.2 Host On-Demand and LDAP overview -- 8.3 Supported LDAP directory servers -- 8.4 Schema installation -- 8.4.1 Netscape Directory Server -- 8.4.2 IBM SecureWay LDAP Directory Server -- 8.5 Host On-Demand directory operations -- 8.5.1 Switching to an LDAP directory server -- 8.5.2 Unable to enable LDAP -- 8.5.3 LDAP migration implications -- 8.6 Operational issues -- 8.6.1 Startup sequence -- 8.6.2 Reverting to the private data store if a directory server fails -- 8.6.3 Debug tracing of the Service Manager -- 8.6.4 LDAP logs -- Chapter 9. Configuration servlet -- 9.1 Overview -- 9.2 Installation -- 9.2.1 Manual installation -- 9.3 Modifying configuration servlet -- 9.3.1 Accessing Configuration Servlet -- 9.3.2 Testing the servlet -- 9.4 Enabling clients -- 9.5 Referencing the configuration servlet -- 9.5.1 Direct reference -- 9.5.2 Indirect reference -- 9.6 Implementation scenarios -- 9.6.1 Load balancing -- 9.6.2 Native Authentication -- 9.7 Problem determination -- Chapter 10. OS/400 Proxy -- 10.1 How to configure a simple session.
10.2 Using the OS/400 Proxy.
Record Nr. UNINA-9910815710103321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM WebSphere V5 edge of network patterns [[electronic resource] /] / [Vinodha Ramanujam, Byron Braswell]
IBM WebSphere V5 edge of network patterns [[electronic resource] /] / [Vinodha Ramanujam, Byron Braswell]
Autore Ramanujam Vinodha
Edizione [1st ed.]
Pubbl/distr/stampa Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Descrizione fisica 1 online resource (298 p.)
Altri autori (Persone) BraswellByron
Collana WebSphere software
IBM redbooks
Soggetto topico Electronic commerce - Computer programs
Electronic commerce - Security measures
Software patterns
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449738503321
Ramanujam Vinodha  
Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM WebSphere V5 edge of network patterns [[electronic resource] /] / [Vinodha Ramanujam, Byron Braswell]
IBM WebSphere V5 edge of network patterns [[electronic resource] /] / [Vinodha Ramanujam, Byron Braswell]
Autore Ramanujam Vinodha
Edizione [1st ed.]
Pubbl/distr/stampa Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Descrizione fisica 1 online resource (298 p.)
Altri autori (Persone) BraswellByron
Collana WebSphere software
IBM redbooks
Soggetto topico Electronic commerce - Computer programs
Electronic commerce - Security measures
Software patterns
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783393503321
Ramanujam Vinodha  
Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM WebSphere V5 edge of network patterns / / [Vinodha Ramanujam, Byron Braswell]
IBM WebSphere V5 edge of network patterns / / [Vinodha Ramanujam, Byron Braswell]
Autore Ramanujam Vinodha
Edizione [1st ed.]
Pubbl/distr/stampa Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Descrizione fisica 1 online resource (298 p.)
Altri autori (Persone) BraswellByron
Collana WebSphere software
IBM redbooks
Soggetto topico Electronic commerce - Computer programs
Electronic commerce - Security measures
Software patterns
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to Patterns -- Chapter 1. Patterns for e-business -- 1.1 The Patterns for e-business layered asset model -- 1.2 How to use the Patterns for e-business -- 1.2.1 Select a Business, Integration, or Composite pattern, or a Custom design -- 1.2.2 Selecting Application patterns -- 1.2.3 Review Runtime patterns -- 1.2.4 Review product mappings -- 1.2.5 Review guidelines and related links -- 1.3 Summary -- Chapter 2. Edge of network Runtime patterns for authorization and authentication -- 2.1 Edge of network authorization and authentication -- 2.1.1 User authentication -- 2.1.2 User authorization -- 2.2 The need for authorization and authentication -- 2.2.1 Considerations -- 2.3 Runtime node types and tiers -- 2.3.1 Runtime nodes -- 2.3.2 Network tiers -- 2.4 Runtime patterns for authorization and authorization -- 2.4.1 Application patterns -- 2.4.2 Basic Runtime pattern -- 2.4.3 Runtime variation 1: single caching proxy -- 2.4.4 Runtime variation 2: caching proxy with security plug-in -- 2.4.5 Runtime variation 3: high availability caching proxies -- Part 2 Runtime patterns: technology guidelines -- Chapter 3. Tivoli Access Manager technology guidelines -- 3.1 Tivoli Access Manager for e-business -- 3.2 Web server security characteristics -- 3.3 Tivoli Access Manager overview -- 3.3.1 Policy-based access control -- 3.3.2 Architectural choices -- 3.3.3 Authentication -- 3.3.4 Authorization -- 3.4 Tivoli Access Manager base components -- 3.4.1 User registry -- 3.4.2 Authorization database -- 3.4.3 Policy Server -- 3.4.4 Authorization Service -- 3.4.5 The pdadmin utility -- 3.4.6 Web Portal Manager -- 3.5 Tivoli Access Manager Blades -- 3.5.1 WebSEAL.
3.5.2 Tivoli Access Manager Plug-in for Edge Server -- 3.5.3 Plug-in for Web servers -- 3.6 Access control of Web content and applications -- 3.6.1 Typical business requirements -- 3.6.2 Typical design objectives (technical requirements) -- 3.7 Basic architectural principles -- 3.7.1 Principle 1 -- 3.7.2 Principle 2 -- 3.7.3 Principle 3 -- 3.8 Tivoli Access Manager component interactions -- 3.9 Component configuration and placement -- 3.9.1 Network zones -- 3.9.2 Secure communication issues -- 3.9.3 Specific Access Manager component placement guidelines -- 3.9.4 Summarizing Access Manager component placement issues -- Chapter 4. Edge Components technology guidelines -- 4.1 WebSphere Application Server Edge Components -- 4.1.1 Components -- 4.1.2 History -- 4.2 Caching Proxy -- 4.2.1 Forward proxy -- 4.2.2 Reverse proxy -- 4.2.3 Cache -- 4.3 Load Balancer -- 4.3.1 Load Balancer forwarding methods -- 4.3.2 Media Access Control (MAC) forwarding -- 4.3.3 Network Address Translation (NAT) forwarding -- 4.3.4 Network Address Port Translation (NAPT) forwarding -- 4.3.5 Load Balancer High Availability feature -- 4.3.6 Load Balancer Mutual High Availability feature -- 4.3.7 Wide Area Network Dispatcher (WAND) -- 4.3.8 Advisors -- 4.3.9 Metric Server -- Part 3 Guidelines -- Chapter 5. Common installation and configuration guidelines -- 5.1 Common installation topics -- 5.1.1 Windows 2000 -- 5.1.2 AIX V4.3.3 -- 5.1.3 Additional software -- 5.1.4 References -- 5.2 IBM Directory Server V4.1 on Windows 2000 -- 5.2.1 Configuring the IBM Directory Server -- 5.3 Tivoli Access Manager V4.1 on Windows 2000 -- 5.3.1 Configuring Tivoli Access Manager V4.1 -- 5.4 Caching Proxy V5 on Windows 2000 -- 5.4.1 Configuring Caching Proxy V5 -- 5.5 Tivoli Access Manager Plug-in on Windows 2000 -- 5.5.1 IBM Directory Client V4.1.
5.5.2 Tivoli Access Manager V4.1 runtime and Plug-in for Edge Server -- 5.6 IBM Directory Server 4.1 on AIX 4.3.3 -- 5.6.1 Configuring IBM Directory Server V4.1 in AIX 4.3.3 -- 5.7 Tivoli Access Manager V4.1 on AIX 4.3.3 -- 5.7.1 Configuration of Tivoli Access Manager V4.1 in AIX V4.3.3 -- 5.8 Caching Proxy V5 for AIX V4.3.3 -- 5.8.1 Installation using the setup program -- 5.8.2 Configuring the Caching Proxy as a reverse proxy -- 5.9 Tivoli Access Manager Plug-in on AIX 4.3.3 -- 5.9.1 IBM Directory Client V4.1 and Tivoli Access Manager RTE V4.1 -- 5.9.2 Tivoli Access Manager Plug-in for Edge Server -- 5.9.3 Starting the Caching Proxy with the plug-in installed -- 5.10 Administration of the Caching Proxy and plug-in -- 5.10.1 Re-enabling browser administration of the Caching Proxy -- Chapter 6. Sample authentication and authorization environment -- 6.1 Sample scenario environment -- 6.2 Access Manager Plug-in files and tools -- 6.2.1 Configuration files -- 6.2.2 Configuration tools -- 6.3 Sample scenario -- 6.3.1 Defining the reverse proxy host name -- 6.3.2 Checking the local object space definition -- 6.3.3 Adding the remote object space definition -- 6.3.4 Defining Users and ACLs in Tivoli Access Manager -- 6.3.5 Adding proxy statements -- 6.3.6 Accessing the unprotected back-end server ka6brxz -- 6.3.7 Accessing the protected back-end server rs600010 -- Part 4 Appendixes -- Glossary -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover.
Record Nr. UNINA-9910810044003321
Ramanujam Vinodha  
Research Triangle Park, NC, : IBM, International Technical Support Organization, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Patterns for the edge of network [[electronic resource] /] / [Richard Voegeli, Byron Braswell]
Patterns for the edge of network [[electronic resource] /] / [Richard Voegeli, Byron Braswell]
Autore Voegeli Richard
Edizione [1st ed.]
Pubbl/distr/stampa Triangle Park, NC, : IBM Redbooks, 2002
Descrizione fisica 1 online resource (422 p.)
Disciplina 658.8/72/0285
Altri autori (Persone) BraswellByron
Collana Redbooks
Soggetto topico Electronic commerce
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910454619203321
Voegeli Richard  
Triangle Park, NC, : IBM Redbooks, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Patterns for the edge of network [[electronic resource] /] / [Richard Voegeli, Byron Braswell]
Patterns for the edge of network [[electronic resource] /] / [Richard Voegeli, Byron Braswell]
Autore Voegeli Richard
Edizione [1st ed.]
Pubbl/distr/stampa Triangle Park, NC, : IBM Redbooks, 2002
Descrizione fisica 1 online resource (422 p.)
Disciplina 658.8/72/0285
Altri autori (Persone) BraswellByron
Collana Redbooks
Soggetto topico Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910782027003321
Voegeli Richard  
Triangle Park, NC, : IBM Redbooks, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Patterns for the edge of network / / [Richard Voegeli, Byron Braswell]
Patterns for the edge of network / / [Richard Voegeli, Byron Braswell]
Autore Voegeli Richard
Edizione [1st ed.]
Pubbl/distr/stampa Triangle Park, NC, : IBM Redbooks, 2002
Descrizione fisica 1 online resource (422 p.)
Disciplina 658.8/72/0285
Altri autori (Persone) BraswellByron
Collana Redbooks
Soggetto topico Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Introduction to Patterns -- Chapter 1. Patterns for e-business -- 1.1 The Patterns for e-business layered asset model -- 1.2 How to use the Patterns for e-business -- 1.2.1 Select a Business, Integration, or Composite pattern, or a Custom design -- 1.2.2 Selecting Application patterns -- 1.2.3 Review Runtime patterns -- 1.2.4 Review Product mappings -- 1.2.5 Review guidelines and related links -- 1.3 Summary -- Chapter 2. Edge of network Runtime patterns for high availability -- 2.1 High availability principles -- 2.1.1 High availability rules for Runtime environments -- 2.1.2 Redundancy -- 2.1.3 Request distribution -- 2.2 Runtime node types and tiers -- 2.2.1 Runtime nodes -- 2.2.2 Network tiers -- 2.3 Runtime patterns for high availability -- 2.3.1 Application patterns -- 2.3.2 Basic Runtime pattern -- 2.3.3 Basic Runtime pattern variation 1: Single load balancer -- 2.3.4 Basic Runtime pattern variation 2: Load balancer hot standby -- 2.3.5 Basic Runtime pattern variation 3: Mutual high availability -- 2.3.6 Basic Runtime pattern variation 4: wide area load balancing -- Chapter 3. Edge of network Runtime patterns for performance -- 3.1 Performance factors -- 3.2 Enhancing performance with proxy servers -- 3.3 Runtime nodes -- 3.4 Runtime patterns -- 3.4.1 Basic Runtime pattern variation 5: Redirectors -- 3.4.2 Basic Runtime pattern variation 6: separation -- 3.4.3 Basic Runtime pattern variation 7: caching proxy -- 3.5 Where to cache -- Part 2 Runtime patterns: guidelines -- Chapter 4. Technology guidelines -- 4.1 WebSphere Edge Server -- 4.1.1 Components -- 4.1.2 History -- 4.2 Load Balancer -- 4.2.1 Load Balancer forwarding methods -- 4.2.2 Media Access Control (MAC) forwarding.
4.2.3 Network Address Translation (NAT) forwarding -- 4.2.4 Network Address Port Translation (NAPT) forwarding -- 4.2.5 Load Balancer High Availability feature -- 4.2.6 Load Balancer Mutual High Availability feature -- 4.2.7 Wide Area Network Dispatcher (WAND) -- 4.2.8 Advisors -- 4.2.9 Metric Server -- 4.3 Caching Proxy -- 4.3.1 Forward proxy -- 4.3.2 Reverse proxy -- 4.3.3 Cache -- 4.4 Considerations for a high availability configuration -- 4.4.1 High availability configuration of nodes -- 4.4.2 Server affinity -- 4.4.3 Failover -- 4.5 WebSphere plug-in -- Chapter 5. Security guidelines -- 5.1 The need for security -- 5.2 Concepts of cryptography and digital certificates -- 5.2.1 Symmetric encryption algorithms -- 5.2.2 Asymmetric encryption algorithms -- 5.2.3 Performance issues of cryptosystems -- 5.2.4 Cryptosystems for data integrity -- 5.2.5 Digital signatures -- 5.2.6 Public Key Infrastructure -- 5.3 Firewall concepts -- 5.3.1 General guidelines for implementing firewalls -- 5.3.2 Firewall categories -- 5.3.3 Hardening -- 5.4 Virtual private network (VPN) and IPSec -- 5.4.1 IPSec -- 5.4.2 Alternative VPN solutions: Layer 2 Tunnelling Protocol -- 5.5 Secure Sockets Layer (SSL) -- 5.5.1 Establishing secure communications with SSL -- 5.5.2 SSL considerations -- 5.5.3 Where to use SSL -- 5.6 Authentication and authorization -- 5.6.1 User authentication -- 5.6.2 User authorization -- 5.7 Authenticating proxy -- 5.7.1 Runtime pattern variation 8: Authenticating proxy -- Part 3 Runtime implementation -- Chapter 6. Common installation and configuration guidelines -- 6.1 Common installation guidelines -- 6.1.1 General guidelines -- 6.1.2 Load Balancer -- 6.1.3 Caching Proxy -- 6.1.4 Proxy CBR -- 6.1.5 DB2 Client -- 6.1.6 Application Server -- 6.2 Common configuration guidelines -- 6.2.1 Aliasing a loopback adapter.
Chapter 7. Test environment example -- 7.1 Scenario description -- 7.1.1 Overview -- 7.1.2 Traffic flow -- 7.2 Configuration description -- 7.2.1 Databases -- 7.2.2 WebSphere Application Server -- 7.2.3 Load balancer node -- 7.2.4 Testing the environment -- Chapter 8. Sample ASP environment -- 8.1 Scenario description -- 8.1.1 Traffic flow -- 8.1.2 Scalability -- 8.1.3 Naming -- 8.1.4 Node functionalities -- 8.2 Basic configuration description -- 8.2.1 Name resolution -- 8.2.2 DB Server -- 8.2.3 DB Client -- 8.2.4 Application servers -- 8.2.5 HTTP server -- 8.2.6 Caching proxies -- 8.2.7 Load balancers -- 8.3 Configure WebSphere Application Server for local dynacache -- 8.3.1 Web Application Servers -- 8.4 Testing local dynacache -- 8.5 Configure external dynacache -- 8.5.1 Caching proxy servers -- 8.5.2 Web Application Servers -- 8.6 Testing external dynacache -- 8.6.1 Dynamic query responses issue -- Chapter 9. Company environment -- 9.1 Scenario description -- 9.1.1 Traffic flow -- 9.1.2 Scalability -- 9.1.3 Naming -- 9.1.4 Node functionalities -- 9.2 Configuration description -- 9.2.1 Name resolution -- 9.2.2 Database server -- 9.2.3 DB clients -- 9.2.4 Application servers -- 9.2.5 HTTP servers -- 9.2.6 Caching Proxies -- 9.2.7 Load balancers -- 9.3 Testing the environment -- Appendix A. Configuration files -- ASP environment configuration files -- Glossary -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover.
Record Nr. UNINA-9910809816403321
Voegeli Richard  
Triangle Park, NC, : IBM Redbooks, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Using IBM WebSphere host access transformation services V5 [[electronic resource] /] / [Bryon Braswell, Ming can Jing, Alejandro Saavedra]
Using IBM WebSphere host access transformation services V5 [[electronic resource] /] / [Bryon Braswell, Ming can Jing, Alejandro Saavedra]
Autore Braswell Byron
Edizione [1st ed.]
Pubbl/distr/stampa Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004
Descrizione fisica 1 online resource (384 p.)
Altri autori (Persone) BraswellByron
JingMing can
SaavedraAlejandro
Collana IBM redbooks
Soggetto topico Electronic commerce - Computer programs
Business enterprises - Computer networks
Client/server computing
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449883903321
Braswell Byron  
Research Triangle Park, NC, : IBM, International Technical Support Organization, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui