uCosminexus Application Server, Security Management Guide
This chapter describes various system configurations for ensuring security. The table below shows how the chapter is organized.
Table 3-1 Organization of this chapter (System Configurations for Ensuring Security)
| Part | Title | Relevant information |
|---|---|---|
| Description | System configurations using a firewall | 3.2 |
| Deployment of reverse proxies in a DMZ | 3.3 |
Note: This chapter does not include information on implementation, setup, operation, or precautions.
All Rights Reserved. Copyright (C) 2013, Hitachi, Ltd