Cargando…

Identity in Modern Applications /

Mapping a person, place, or thing to a software resource in a verifiable manner is the basis of identity. Confirming that identity is a complex process, particularly when the identity mapping has to be verified genuine and authentic. Everything on the internet that houses private information is tied...

Descripción completa

Detalles Bibliográficos
Autor principal: Atchison, Lee (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: O'Reilly Media, Inc., 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1264230337
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 150721s2021 xx o 000 0 eng d
040 |a AU@  |b eng  |c AU@  |d OCLCQ  |d TOH  |d OCLCQ 
020 |z 9781098107772 
024 8 |a 9781098107789 
029 0 |a AU@  |b 000069704181 
029 1 |a AU@  |b 000073550491 
035 |a (OCoLC)1264230337 
049 |a UAMI 
100 1 |a Atchison, Lee,  |e author. 
245 1 0 |a Identity in Modern Applications /  |c Atchison, Lee. 
250 |a 1st edition. 
264 1 |b O'Reilly Media, Inc.,  |c 2021. 
300 |a 1 online resource (35 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Mapping a person, place, or thing to a software resource in a verifiable manner is the basis of identity. Confirming that identity is a complex process, particularly when the identity mapping has to be verified genuine and authentic. Everything on the internet that houses private information is tied to identity and identity management. In this report, author Lee Atchison shows C-suite execs, engineering execs, architects, and others involved in building software applications the modern identity management techniques available to safeguard that simple access point. You'll learn how and why these techniques constantly need to keep up with modern application development and the growing sophistication of the people that safely interact or maliciously tamper with them. Explore the complex process of mapping a person, place, or thing to a software resource in a verifiable manner Get examples of real-world authentication, including methods and best practices for working with application credentials Understand the differences between single-factor and multifactor authentication Learn why every authentication method has flaws, including today's state-of-the-art processes Explore authorization, the process for granting users access to specific resources, and how it differs from authentication Understand trust relationships using trust systems to create more secure applications and systems. 
542 |f Copyright © O'Reilly Media, Inc. 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed July 25, 2021) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098107789/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP