Cargando…
Identity and access management: business performance through connected intelligence
Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier Science
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1641625 |
_version_ | 1780934876818571264 |
---|---|
author | Osmanoglu, Ertem |
author_facet | Osmanoglu, Ertem |
author_sort | Osmanoglu, Ertem |
collection | CERN |
description | Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements |
id | cern-1641625 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Elsevier Science |
record_format | invenio |
spelling | cern-16416252021-04-21T21:23:54Zhttp://cds.cern.ch/record/1641625engOsmanoglu, ErtemIdentity and access management: business performance through connected intelligenceComputing and ComputersIdentity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirementsElsevier Scienceoai:cds.cern.ch:16416252013 |
spellingShingle | Computing and Computers Osmanoglu, Ertem Identity and access management: business performance through connected intelligence |
title | Identity and access management: business performance through connected intelligence |
title_full | Identity and access management: business performance through connected intelligence |
title_fullStr | Identity and access management: business performance through connected intelligence |
title_full_unstemmed | Identity and access management: business performance through connected intelligence |
title_short | Identity and access management: business performance through connected intelligence |
title_sort | identity and access management: business performance through connected intelligence |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1641625 |
work_keys_str_mv | AT osmanogluertem identityandaccessmanagementbusinessperformancethroughconnectedintelligence |