IBM Business Process Manager Security: Concepts and Guidance IBM Business Process Manager Security: Concepts and Guidance

IBM Business Process Manager Security: Concepts and Guidance

Publisher Description

This IBM® Redbooks® publication provides information about security concerning an organization's business process management (BPM) program, about common security holes that often occur in this field, and describes techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation.

Many of the practices described in this book apply equally to generic Java Platform and Enterprise Edition (J2EE) applications, as well as to BPM. However, it focuses on aspects that typically do not receive adequate consideration in actual practice. Also, it addresses equally the BPM Standard and BPM Advanced Editions, although there are topics inherent in BPM Advanced that we considered to be out of scope for this book.

This book is not meant as a technical deep-dive into any one topic, technology, or philosophy. IBM offers a variety of training and consulting services that can help you to understand and evaluate the implications of this book's topic in your own organization.

GENRE
Computers & Internet
RELEASED
2012
September 18
LANGUAGE
EN
English
LENGTH
162
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
5.9
MB

More Books Like This

Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
2007
Introduction to the New Mainframe: Security Introduction to the New Mainframe: Security
2007
Mastering Active Directory for Windows Server 2008 Mastering Active Directory for Windows Server 2008
2008
IBM FileNet P8 Platform and Architecture IBM FileNet P8 Platform and Architecture
2011
CISSP All-in-One Exam Guide, Eighth Edition CISSP All-in-One Exam Guide, Eighth Edition
2018

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009

Customers Also Bought

The InfoSec Handbook The InfoSec Handbook
2014
Managing Risk and Information Security Managing Risk and Information Security
2013
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
Computer Networking Computer Networking
2018
Cyber Security: It's Personal Cyber Security: It's Personal
2017
Introduction to Artificial Intelligence for Security Professionals Introduction to Artificial Intelligence for Security Professionals
2017