Литмир - Электронная Библиотека
Литмир - Электронная Библиотека > Roebuck Kevin (EN) > Identity Management: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Identity Management: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Добавить похожую книгу
To Dare and to Conquer
Похожа
Непохожа
American Democracy
Похожа
Непохожа
Identity Management: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Author:Roebuck Kevin (EN)
A introductory fragment is available
Language of a book: Английский
Publisher: Gardners Books

    Identity management (or ID management, or simply IdM) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals. This book is your ultimate resource for Identity Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Identity Management right away, covering: Identity management, Windows CardSpace, CCSO Nameserver, Certification on demand, Common Indexing Protocol, Credential, Digital identity, Directory information tree, Directory System Agent, Electronic authentication, Federated identity, Federated identity management, Federated Naming Service, Future of Identity in the Information Society, Group (computing), Identity access management, Identity as a service, Identity assurance, Identity Assurance Framework, Identity change, Identity Governance Framework, Identity intelligence, Identity management system, Identity Management Theory, Identity metasystem, Identity score, Information Card, Information Card Foundation, Liberty Alliance, Scott Mitic, Mobile identity management, Mobile signature, Mobile Signature Roaming, Multi-master replication, Novell Storage Manager, Online identity management, Oracle Identity Management, Organizational Unit, Password management, Password manager, Privacy, Privacy-enhancing technologies, Profiling practices, Service Provisioning Markup Language, Trombinoscope, User profile, User provisioning software, White pages schema, Identity, Identity (philosophy), Character mask, Collective identity, Crystallized self, Cultural contracts, Deidentification, Digital footprint, Gender schema theory, 'I' and the 'me', Identity control theory, Identity fraud, Identity of indiscernibles, Identity Performance, Identity theft, Identity Theft Resource Center, Internarrative Identity, Law of identity, Mobile identity, Open individualism, Personal branding, Personal identity (philosophy), Role, Self-fashioning, Self-perception theory, Self-schema, Sexual orientation identity, Shibboleth, Ship of Theseus, Social identity, User:Tabularasasm est, Societal security, Wishful Identification, AAA protocol, Information technology security audit, Automated information systems security, Canary trap, CBL Index, CESG Claims Tested Mark, Chroot, Commercial Product Assurance, Common Criteria Testing Laboratory, Composite Blocking List, Computer forensics, Computer security policy, Computer Underground Digest, Cryptographic Module Testing Laboratory, Control system security, Cyber security standards, Cyber spying, Cyber-security regulation, Defense in depth (computing), Department of Defense Information Assurance Certification and Accreditation Process, Department of Defense Information Technology Security Certification and Accreditation Process, Differentiated security, DShield, Dynablock, Enterprise Privacy Authorization Language, Evaluation Assurance Level, Exit procedure, Filesystem permissions, Full disclosure, Fuzz testing, Google hacking, Hardening (computing), Host protected area, Internet ethics, Intruder detection, Labeled Security Protection Profile, Erik Laykin, Mobile device forensics, MyNetWatchman, National Information Assurance Certification and Accreditation Process, National Information Assurance Training and Education Center, National Strategy to Secure Cyberspace, Need to know, Network security policy, Not Just Another Bogus List...and much moreThis book explains in-depth the real drivers and workings of Identity Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Identity Management with the objectivity of experienced professionals.

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :0]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :0]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"470885","o":30}