Frete Grátis
  • Google Plus
Livro Digital

Identity Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, (Cód: 3541974)

Roebuck, Kevin


Ooops! Este produto não está mais a venda.
Mas não se preocupe, temos uma versão atualizada para você.

Ooopss! Este produto está fora de linha, mas temos outras opções para você.
Veja nossas sugestões abaixo!

R$ 77,05 em até 2x de R$ 38,53 sem juros
Cartão Saraiva R$ 73,20 (-5%) em até 1x no cartão ou em até 3x de R$ 25,68 sem juros

Cartão Saraiva


Identity management (or ID management, or simply IdM) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals. This book is your ultimate resource for Identity Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Identity Management right away, covering: Identity management, Windows CardSpace, CCSO Nameserver, Certification on demand, Common Indexing Protocol, Credential, Digital identity, Directory information tree, Directory System Agent, Electronic authentication, Federated identity, Federated identity management, Federated Naming Service, Future of Identity in the Information Society, Group (computing), Identity access management, Identity as a service, Identity assurance, Identity Assurance Framework, Identity change, Identity Governance Framework, Identity intelligence, Identity management system, Identity Management Theory, Identity metasystem, Identity score, Information Card, Information Card Foundation, Liberty Alliance, Scott Mitic, Mobile identity management, Mobile signature, Mobile Signature Roaming, Multi-master replication, Novell Storage Manager, Online identity management, Oracle Identity Management, Organizational Unit, Password management, Password manager, Privacy, Privacy-enhancing technologies, Profiling practices, Service Provisioning Markup Language, Trombinoscope, User profile, User provisioning software, White pages schema, Identity, Identity (philosophy), Character mask, Collective identity, Crystallized self, Cultural contracts, Deidentification, Digital footprint, Gender schema theory, 'I' and the 'me', Identity control theory, Identity fraud, Identity of indiscernibles, Identity Performance, Identity theft, Identity Theft Resource Center, Internarrative Identity, Law of identity, Mobile identity, Open individualism, Personal branding, Personal identity (philosophy), Role, Self-fashioning, Self-perception theory, Self-schema, Sexual orientation identity, Shibboleth, Ship of Theseus, Social identity, User:Tabularasasm est, Societal security, Wishful Identification, AAA protocol, Information technology security audit, Automated information systems security, Canary trap, CBL Index, CESG Claims Tested Mark, Chroot, Commercial Product Assurance, Common Criteria Testing Laboratory, Composite Blocking List, Computer forensics, Computer security policy, Computer Underground Digest, Cryptographic Module Testing Laboratory, Control system security, Cyber security standards, Cyber spying, Cyber-security regulation, Defense in depth (computing), Department of Defense Information Assurance Certification and Accreditation Process, Department of Defense Information Technology Security Certification and Accreditation Process, Differentiated security, DShield, Dynablock, Enterprise Privacy Authorization Language, Evaluation Assurance Level, Exit procedure, Filesystem permissions, Full disclosure, Fuzz testing, Google hacking, Hardening (computing), Host protected area, Internet ethics, Intruder detection, Labeled Security Protection Profile, Erik Laykin, Mobile device forensics, MyNetWatchman, National Information Assurance Certification and Accreditation Process, National Information Assurance Training and Education Center, National Strategy to Secure Cyberspace, Need to know, Network security policy, Not Just Another Bogus List...and much more. This book explains in-depth the real drivers and workings of Identity Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Identity Management with the objectivity of experienced professionals.


Produto sob encomenda Sim
Cód. Barras 9781743046616
Início da Venda 23/11/2012
Territorialidade Internacional
Formato Livro Digital Pdf
Gratuito Não
Tamanho do Arquivo 8507
Proteção Drm Sim
Idioma 337
Código do Formato Pdf
Número de Páginas 368 (aproximado)
Ano da Publicação 111
Peso 0.00 Kg
AutorRoebuck, Kevin


Avaliação geral: 0

Você está revisando: Identity Management: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact,

Identity Management: High-impact Strategies - What You Need to Know: Defini... (Cód: 3541974) Identity Management: High-impact Strategies - What... (Cód: 3541974)
R$ 77,05
Identity Management: High-impact Strategies - What You Need to Know: Defini... (Cód: 3541974) Identity Management: High-impact Strategies - What... (Cód: 3541974)
R$ 77,05