Identity and Access Management

Business Performance Through Connected Intelligence

de

Éditeur :

Syngress


Paru le : 2013-11-19



eBook Téléchargement DRM Adobe 🛈 ebook sans DRM
Lecture en ligne (streaming)
45,31

Téléchargement immédiat
Dès validation de votre commande
Ajouter à ma liste d'envies
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

Description
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. - Focuses on real-word implementations - Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation - Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases - Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates
Pages
648 pages
Collection
n.c
Parution
2013-11-19
Marque
Syngress
EAN papier
9780124081406
EAN EPUB
9780124104334

Informations sur l'ebook
Nombre pages copiables
64
Nombre pages imprimables
64
Taille du fichier
-
Prix
45,31 €
EAN PDF SANS DRM
9780124104334

Prix
48,48 €

Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young's Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).

Suggestions personnalisées