The boundaries between the real and the virtual are becoming increasingly blurred. In a corporate setting, it is more important than ever to identify and control the way the organization deals with customers, suppliers, employees, and other users who may interact with information systems.
Identity Management, or IDM, refers to how humans are identified and authorized across computer networks. It encompasses issues such as the way users are given an identity, the protection of that identity, and the technologies supporting that protection, such as network protocols, digital certificates, passwords, and so on. Proper identity management is, of course, an essential component of any security strategy.
Identity Management: A Primer provides a complete and comprehensive overview of the elements required for a properly planned identity environment. In it, the authors cover the entire gamut of IDM-related matters, including directories; authentication; provisioning; role-based access control; single sign-on; governance, risk, and compliance; implementation and roadmap; public key infrastructure; electronic identity smartcards; and a wealth of other important topics.
As the title indicates, this book is a primer in which the key issues of identity management are identified and appropriate strategies and preventative measures are covered in an easy-to-understand format, with extensive use of real-world case study examples. Students and IT professionals alike will appreciate this resource as they seek to understand and master the complexity of identity in a virtual world.
With Identity Management: A Primer, you will:
|Author Name:||Graham Williamson, David Yip, Ilan Sharoni and Kent Spaulding|
|Publication Date:||September 15, 2009|
|Product Dimensions:||7 x 0.7 x 9 inches|
|Shipping Weight:||0.66 pounds|
Product Look Inside the Book Author Bio Specifications Welcome to the long-awaited update to IBM i Security Administration and Compliance the definitive IBM i security reference. In this Second...
Product Look Inside the Book Author Bio Specifications Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent...
Product Look Inside the Book Author Bio Specifications In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know...
Product Look Inside the Book Author Bio Specifications Written to address the special disaster recovery planning issues of System i, this book is your step-by-step guide to developing an...