Digital identity /
"The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the r...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Windley, Phillip J., 1958- |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Learning digital identity : design, deploy, and manage identity architectures /
por: Windley, Phillip J., 1958-
Publicado: (2023) -
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
por: Cappelli, Dawn
Publicado: (2012) -
Counter hack reloaded : a step-by-step guide to computer attacks and effective defenses /
por: Skoudis, Ed
Publicado: (2005) -
Managing cybersecurity risk : case studies and solutions /
Publicado: (2018) -
Anti-hacker tool kit.
por: Shema, Mike
Publicado: (2014)