|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn870339997 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140212s2014 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBBG
|d GGVRL
|d B24X7
|d DEBSZ
|d YDXCP
|d OCLCQ
|d OCLCA
|d OCLCF
|d CEF
|d AU@
|d UKAHL
|d CZL
|d DST
|d OCLCQ
|
019 |
|
|
|a 1058195773
|a 1191079611
|a 1295596498
|a 1300602711
|a 1303295696
|
020 |
|
|
|a 9780124104334
|
020 |
|
|
|a 0124104339
|
020 |
|
|
|a 0124081401
|
020 |
|
|
|a 9780124081406
|
020 |
|
|
|z 9780124081406
|
029 |
1 |
|
|a AU@
|b 000053308482
|
029 |
1 |
|
|a DEBBG
|b BV041783853
|
029 |
1 |
|
|a DEBSZ
|b 404335640
|
029 |
1 |
|
|a GBVCP
|b 882725599
|
029 |
1 |
|
|a NZ1
|b 15910815
|
035 |
|
|
|a (OCoLC)870339997
|z (OCoLC)1058195773
|z (OCoLC)1191079611
|z (OCoLC)1295596498
|z (OCoLC)1300602711
|z (OCoLC)1303295696
|
037 |
|
|
|a CL0500000382
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b O783 2013
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Osmanoglu, T. Ertem.
|
245 |
1 |
0 |
|a Identity and access management :
|b business performance through connected intelligence /
|c Ertem Osmanoglu.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 1. Business requirements and business case development -- 2. IAM framework, key principles and definitions -- 3. Current state and capability maturity -- 4. Common challenges and key considerations -- 5. Case study : access reviews -- 6. Future state definition -- 7. IAM roadmap and strategy -- 8. Identity and access intelligence : a risk-based approach -- 9. Enabling business through cloud-based IAM -- 10. Case study : future state -- finding a way out of the labyrinth -- 11. Implementation methodology and approach -- 12. Access request, approval, and provisioning -- 13. Enforcement -- 14. Access review and certification -- 15. Privileged access management -- 16. Roles and rules -- 17. IAM product selection -- 18. Case study : implementation -- 19. The future of identity and access management.
|
520 |
|
|
|a Provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy Identity and Access Management (IAM) solutions.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a False personation
|x Prevention.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
776 |
0 |
8 |
|i Print version:
|a Osmanoglu, T. Ertem.
|t Identity and access management.
|d Amsterdam, [Netherlands] : Syngress, an imprint of Elsevier, 2013
|z 9780124081406
|w (DLC) 2013036149
|w (OCoLC)857863230
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124081406/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058864
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6ZZY
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11396745
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25541865
|
994 |
|
|
|a 92
|b IZTAP
|