Identifying threats and countermeasures for middle- tier application servers
Securing the communication channels between tiers
Securing middle-tier Remoting and Web services applications
Locking down an Enterprise Services application
Configuring an internal firewall