Securing the perimeter : deploying identity and access management with free open source software /
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most co...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Schwartz, Michael (Autor) |
Otros Autores: | Machulak, M. P. (Maciej P.) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[New York, New York] :
Apress,
[2018]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Role-based access control /
por: Ferraiolo, David
Publicado: (2003) -
Role-based access control /
por: Ferraiolo, David
Publicado: (2007) -
Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 /
por: Williams, Barry L.
Publicado: (2016) -
Federated identity primer /
por: Rountree, Derrick
Publicado: (2013) -
Getting started with OpenBTS : build open source mobile networks /
por: Iedema, Michael
Publicado: (2015)