Description |
1 online resource (1 volume) : illustrations |
|
text file |
Bibliography |
Includes bibliographical references and index. |
Contents |
1. Business requirements and business case development -- 2. IAM framework, key principles and definitions -- 3. Current state and capability maturity -- 4. Common challenges and key considerations -- 5. Case study : access reviews -- 6. Future state definition -- 7. IAM roadmap and strategy -- 8. Identity and access intelligence : a risk-based approach -- 9. Enabling business through cloud-based IAM -- 10. Case study : future state -- finding a way out of the labyrinth -- 11. Implementation methodology and approach -- 12. Access request, approval, and provisioning -- 13. Enforcement -- 14. Access review and certification -- 15. Privileged access management -- 16. Roles and rules -- 17. IAM product selection -- 18. Case study : implementation -- 19. The future of identity and access management. |
Summary |
Provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy Identity and Access Management (IAM) solutions. |
Language |
English. |
Subject |
Computer security.
|
|
Computers -- Access control.
|
|
Computer networks -- Security measures.
|
|
False personation -- Prevention.
|
|
Computer Security |
|
Sécurité informatique. |
|
Ordinateurs -- Accès -- Contrôle. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer networks -- Security measures |
|
Computer security |
|
Computers -- Access control |
Other Form: |
Print version: Osmanoglu, T. Ertem. Identity and access management. Amsterdam, [Netherlands] : Syngress, an imprint of Elsevier, 2013 9780124081406 (DLC) 2013036149 (OCoLC)857863230 |
ISBN |
9780124104334 |
|
0124104339 |
|
0124081401 |
|
9780124081406 |
|