Computer Tutorials and Books
Tutorials: C / C++ | C#.NET | PHP MySQL | Java | Java Script | jQuery | HTML | xHTML | HTML5 | VB Script | CSS

Books: C/C++ | C# | Android | Mathematics | Database | Cloud | Graphics | Networking | Oracle | Hardware | AI
Categories Download eBook: Identity Management on a Shoestring Bookmark and Share

Title Identity Management on a Shoestring
Author(s) Ganesh Prasad, Umesh Rajbhandari
Publisher: InfoQ (Mar 19, 2012)
Language: English
ISBN-13: 987�1�105-55863-4
Book Description

This document is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Identity and Access Management (IAM) system. It is neither a conceptual treatment of Identity (for which we would refer the reader to Kim Cameron's excellent work on the Laws of Identity) nor a detailed technical manual on a particular product. It describes a pragmatic and cost-effective architectural approach to implementing IAM within an organisation, based on the experience of the authors.

Our background and experience are largely with Java-based technologies, so Java shops would probably be best positioned to benefit from our suggestions, but we are sure these general principles can be suitably adapted to other technology platforms. As with any piece of unsolicited advice, the usual caveats apply. No guarantees or warranties are provided or implied. The reader is expected to apply commonsense and sound design judgement when developing a solution based on this approach.
Download eBook
Identity Management on a Shoestring

More Cryptography and Security eBooks:
Visual Cryptography and Its Applications
The Foundations of Cryptographys
Cryptography: An Introduction, 3rd Edition
Forensic Discovery
Theory and Practice of Cryptography and Network Security Protocols and Technologies
Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series
Cryptography and Security in Computing
Recent Advances in Steganography
Web Application Security Guide
Security Enhanced Applications for Information Systems
Applied Cryptography and Network Security
Security+ Essentials
Own Your Space: Keep Yourself and Your Stuff Safe Online
Handbook of Applied Cryptography
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

Home - Advertise - Contact - Disclaimer - About Us
© Since 2006 -- All Rights Reserved.