Cargando…

Identity and access management : business performance through connected intelligence /

Provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy Identity and Access Management (IAM) solutions.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Osmanoglu, T. Ertem
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn870339997
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 140212s2014 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d DEBBG  |d GGVRL  |d B24X7  |d DEBSZ  |d YDXCP  |d OCLCQ  |d OCLCA  |d OCLCF  |d CEF  |d AU@  |d UKAHL  |d CZL  |d DST  |d OCLCQ 
019 |a 1058195773  |a 1191079611  |a 1295596498  |a 1300602711  |a 1303295696 
020 |a 9780124104334 
020 |a 0124104339 
020 |a 0124081401 
020 |a 9780124081406 
020 |z 9780124081406 
029 1 |a AU@  |b 000053308482 
029 1 |a DEBBG  |b BV041783853 
029 1 |a DEBSZ  |b 404335640 
029 1 |a GBVCP  |b 882725599 
029 1 |a NZ1  |b 15910815 
035 |a (OCoLC)870339997  |z (OCoLC)1058195773  |z (OCoLC)1191079611  |z (OCoLC)1295596498  |z (OCoLC)1300602711  |z (OCoLC)1303295696 
037 |a CL0500000382  |b Safari Books Online 
050 4 |a QA76.9.A25  |b O783 2013 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Osmanoglu, T. Ertem. 
245 1 0 |a Identity and access management :  |b business performance through connected intelligence /  |c Ertem Osmanoglu. 
260 |a Waltham, MA :  |b Syngress,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a 1. Business requirements and business case development -- 2. IAM framework, key principles and definitions -- 3. Current state and capability maturity -- 4. Common challenges and key considerations -- 5. Case study : access reviews -- 6. Future state definition -- 7. IAM roadmap and strategy -- 8. Identity and access intelligence : a risk-based approach -- 9. Enabling business through cloud-based IAM -- 10. Case study : future state -- finding a way out of the labyrinth -- 11. Implementation methodology and approach -- 12. Access request, approval, and provisioning -- 13. Enforcement -- 14. Access review and certification -- 15. Privileged access management -- 16. Roles and rules -- 17. IAM product selection -- 18. Case study : implementation -- 19. The future of identity and access management. 
520 |a Provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy Identity and Access Management (IAM) solutions. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a False personation  |x Prevention. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
776 0 8 |i Print version:  |a Osmanoglu, T. Ertem.  |t Identity and access management.  |d Amsterdam, [Netherlands] : Syngress, an imprint of Elsevier, 2013  |z 9780124081406  |w (DLC) 2013036149  |w (OCoLC)857863230 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124081406/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00058864 
938 |a Cengage Learning  |b GVRL  |n GVRL6ZZY 
938 |a YBP Library Services  |b YANK  |n 11396745 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25541865 
994 |a 92  |b IZTAP