• Complain

IBM Redbooks - Understanding Ldap - Design And Implementation

Here you can read online IBM Redbooks - Understanding Ldap - Design And Implementation full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2004, publisher: Ibm, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

IBM Redbooks Understanding Ldap - Design And Implementation
  • Book:
    Understanding Ldap - Design And Implementation
  • Author:
  • Publisher:
    Ibm
  • Genre:
  • Year:
    2004
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Understanding Ldap - Design And Implementation: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Understanding Ldap - Design And Implementation" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

IBM Redbooks: author's other books


Who wrote Understanding Ldap - Design And Implementation? Find out the surname, the name of the author of the book and a list of all author's works by series.

Understanding Ldap - Design And Implementation — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Understanding Ldap - Design And Implementation" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Note Before using this information and the product it supports read the - photo 1
Note: Before using this information and the product it supports, read the information in .
Second Edition (June 2004)
This edition applies to Version 5, Release 2 of IBM Tivoli Directory Server.
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law : INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces.
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:
AIX
Cloudscape
DB2 Universal Database
DB2
Domino
IBM
ibm.com
iSeries
Lotus Notes
Lotus
MVS
Notes
OS/390
OS/400
pSeries
RACF
RDN
Redbooks (logo)Picture 2
Redbooks
Sametime
SecureWay
SP2
Tivoli Enterprise
Tivoli
WebSphere
World Registry
xSeries
z/OS
zSeries
The following terms are trademarks of other companies:
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, and service names may be trademarks or service marks of others.
Preface
Lightweight Directory Access Protocol (LDAP) is a fast growing technology for accessing common directory information. LDAP has been embraced and implemented in most network-oriented middleware. As an open, vendor-neutral standard, LDAP provides an extendable architecture for centralized storage and management of information that needs to be available for todays distributed systems and services.
After a fast start, it can be assumed that LDAP has become the de facto access method for directory information, much the same as the Domain Name System (DNS) is used for IP address look-up on almost any system on an intranet and on the Internet. LDAP is currently supported in most network operating systems, groupware and even shrink-wrapped network applications.
This book was written for those readers who need to understand the basic principles and concepts of LDAP. Some background knowledge about heterogeneous, distributed systems is assumed and highly beneficial when reading this book. This book is not meant to be an LDAP implementation guide, nor does it contain product-related or vendor-specific information other than as used in examples.
The team that wrote this redbook
This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization, Austin Center.
Steven Tuttle is a Project Leader for the International Technical Support Organization (ITSO), Austin Center. He has 13 years of experience in the IT industry. He has worked at IBM for 10 years, with five years of experience with IBM security products. He holds a degree in Computer Science from Clarkson University in Potsdam, New York, with concentrations in Mathematics and Psychology. His areas of expertise include the IBM Tivoli Enterprise products and the IBM Tivoli Security products. Before joining the ITSO, he worked for IBM Tivoli Services in the Security Practice as an enterprise security solution designer using IBM Tivoli software products.
Ami Ehlenberger has been with IBM for the past five years. Her career has included working in OS/390 development, z/OS Integration Test, and the zSeries Custom Technology Center. Her technical concentration is Internet security, designing solutions that focus on WebSphere, LDAP, and Tivoli security products. Ami has a BS in Computer Science from Indiana University of Pennsylvania and an MBA in e-Business from the University of Phoenix. Ami currently manages the IBM Server and Technology Group's zSeries Services Team. The team specializes in Web enablement and solution design, concentrating on the zSeries platform.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Understanding Ldap - Design And Implementation»

Look at similar books to Understanding Ldap - Design And Implementation. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Understanding Ldap - Design And Implementation»

Discussion, reviews of the book Understanding Ldap - Design And Implementation and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.