Cargando…

Identity and access management: business performance through connected intelligence

Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a...

Descripción completa

Detalles Bibliográficos
Autor principal: Osmanoglu, Ertem
Lenguaje:eng
Publicado: Elsevier Science 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/1641625
_version_ 1780934876818571264
author Osmanoglu, Ertem
author_facet Osmanoglu, Ertem
author_sort Osmanoglu, Ertem
collection CERN
description Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements
id cern-1641625
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Elsevier Science
record_format invenio
spelling cern-16416252021-04-21T21:23:54Zhttp://cds.cern.ch/record/1641625engOsmanoglu, ErtemIdentity and access management: business performance through connected intelligenceComputing and ComputersIdentity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirementsElsevier Scienceoai:cds.cern.ch:16416252013
spellingShingle Computing and Computers
Osmanoglu, Ertem
Identity and access management: business performance through connected intelligence
title Identity and access management: business performance through connected intelligence
title_full Identity and access management: business performance through connected intelligence
title_fullStr Identity and access management: business performance through connected intelligence
title_full_unstemmed Identity and access management: business performance through connected intelligence
title_short Identity and access management: business performance through connected intelligence
title_sort identity and access management: business performance through connected intelligence
topic Computing and Computers
url http://cds.cern.ch/record/1641625
work_keys_str_mv AT osmanogluertem identityandaccessmanagementbusinessperformancethroughconnectedintelligence