Identity Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
368 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Identity Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
368 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Identity management (or ID management, or simply IdM) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals.


This book is your ultimate resource for Identity Management. Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Identity Management right away, covering: Identity management, Windows CardSpace, CCSO Nameserver, Certification on demand, Common Indexing Protocol, Credential, Digital identity, Directory information tree, Directory System Agent, Electronic authentication, Federated identity, Federated identity management, Federated Naming Service, Future of Identity in the Information Society, Group (computing), Identity access management, Identity as a service, Identity assurance, Identity Assurance Framework, Identity change, Identity Governance Framework, Identity intelligence, Identity management system, Identity Management Theory, Identity metasystem, Identity score, Information Card, Information Card Foundation, Liberty Alliance, Scott Mitic, Mobile identity management, Mobile signature, Mobile Signature Roaming, Multi-master replication, Novell Storage Manager, Online identity management, Oracle Identity Management, Organizational Unit, Password management, Password manager, Privacy, Privacy-enhancing technologies, Profiling practices, Service Provisioning Markup Language, Trombinoscope, User profile, User provisioning software, White pages schema, Identity, Identity (philosophy), Character mask, Collective identity, Crystallized self, Cultural contracts, Deidentification, Digital footprint, Gender schema theory, 'I' and the 'me', Identity control theory, Identity fraud, Identity of indiscernibles, Identity Performance, Identity theft, Identity Theft Resource Center, Internarrative Identity, Law of identity, Mobile identity, Open individualism, Personal branding, Personal identity (philosophy), Role, Self-fashioning, Self-perception theory, Self-schema, Sexual orientation identity, Shibboleth, Ship of Theseus, Social identity, User:Tabularasasm est, Societal security, Wishful Identification, AAA protocol, Information technology security audit, Automated information systems security, Canary trap, CBL Index, CESG Claims Tested Mark, Chroot, Commercial Product Assurance, Common Criteria Testing Laboratory, Composite Blocking List, Computer forensics, Computer security policy, Computer Underground Digest, Cryptographic Module Testing Laboratory, Control system security, Cyber security standards, Cyber spying, Cyber-security regulation, Defense in depth (computing), Department of Defense Information Assurance Certification and Accreditation Process, Department of Defense Information Technology Security Certification and Accreditation Process, Differentiated security, DShield, Dynablock, Enterprise Privacy Authorization Language, Evaluation Assurance Level, Exit procedure, Filesystem permissions, Full disclosure, Fuzz testing, Google hacking, Hardening (computing), Host protected area, Internet ethics, Intruder detection, Labeled Security Protection Profile, Erik Laykin, Mobile device forensics, MyNetWatchman, National Information Assurance Certification and Accreditation Process, National Information Assurance Training and Education Center, National Strategy to Secure Cyberspace, Need to know, Network security policy, Not Just Another Bogus List...and much more


This book explains in-depth the real drivers and workings of Identity Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Identity Management with the objectivity of experienced professionals.

Sujets

Informations

Publié par
Date de parution 24 octobre 2012
Nombre de lectures 0
EAN13 9781743046616
Langue English
Poids de l'ouvrage 12 Mo

Informations légales : prix de location à la page 0,1598€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents