Securing Your Mobile Business with IBM Worklight Securing Your Mobile Business with IBM Worklight

Securing Your Mobile Business with IBM Worklight

    • ٣٫٠ - ٢ من التقييمات

وصف الناشر

The IBM® Worklight® mobile application platform helps you to develop, deploy, host, and manage mobile enterprise applications. It also enables companies to integrate security into their overall mobile application lifecycle.

This IBM Redbooks® publication describes the security capabilities offered by Worklight to address mobile application security objectives.

The book begins with an overview of IBM MobileFirst and its security offerings. The book also describes a business scenario illustrating where security is needed in mobile solutions, and how Worklight can help you achieve it.

This publication then provides specific, hands-on guidance about how to integrate Worklight with enterprise security. It also provides step-by-step guidance to implementing mobile security features, including direct update, remote disable, and encrypted offline cache. Integration between Worklight and other IBM security technologies is also covered, including integration with IBM Security Access Manager and IBM WebSphere® DataPower®.

This Redbooks publication is of interest to anyone looking to better understand mobile security, and to learn how to enhance mobile security with Worklight.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٣
٧ نوفمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٣٧٠
الناشر
IBM Redbooks
البائع
International Business Machines Corp
الحجم
٨٫٤
‫م.ب.‬

مراجعات العملاء

SH in SC ،

Mis-titled

This content is not about Worklight. I've downloaded it 3 times in iBooks and it seems to actually be a different redbook about “IBM Operational Decision Manager for z/OS”

Patterns: Integrating WebSphere ILOG JRules with IBM Software Patterns: Integrating WebSphere ILOG JRules with IBM Software
٢٠١١
z/OS Traditional Application Maintenance and Support z/OS Traditional Application Maintenance and Support
٢٠١١
Getting Started with IBM WebSphere Cast Iron Cloud Integration Getting Started with IBM WebSphere Cast Iron Cloud Integration
٢٠١٢
Implementing an Advanced Application Using Processes, Rules, Events, and Reports Implementing an Advanced Application Using Processes, Rules, Events, and Reports
٢٠١٢
CICS and DevOps: What You Need to Know CICS and DevOps: What You Need to Know
٢٠١٦
Who Knew You Could Do That with RPG IV? Modern RPG for the Modern Programmer Who Knew You Could Do That with RPG IV? Modern RPG for the Modern Programmer
٢٠١٨
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
٢٠٠٦
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
٢٠١٢
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
٢٠١٢
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
٢٠١١
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
٢٠١٠
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
٢٠٠٩