O'Reilly logo

IBM Business Process Manager Version 8.0 Production Topologies by Cheng Zhang, Zhi Qiu Xie, J. Keith Wood, Matthias Warkentin, Mohamed Salem, Bobby Pham, Shishir Narain, Vasfi Gucer, Victor Paulo Alves de Almeida, Dawn Ahukanna

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IBM Business Process Manager security
This chapter provides information about security of an organization’s business process management (BPM) program, common security holes that often occur in this field, and techniques for rectifying these holes. It describes preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation.
Many of the practices that are described apply equally to generic Java Platform and Java Platform, Enterprise Edition applications, and to BPM. However, it focuses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required