3. System Configurations for Ensuring Security
This chapter describes various system configurations that can be used to ensure security in J2EE application execution infrastructures. Using examples of system configurations, this chapter provides information about deploying firewalls to suit different types of components and deploying reverse proxies in a DMZ.
- Organization of this chapter