My Account Log in

1 option

Identity and access management : business performance through connected intelligence / Ertem Osmanoglu.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Osmanoglu, T. Ertem.
Series:
Gale eBooks
Language:
English
Subjects (All):
Computer security.
Computers--Access control.
Computers.
Computer networks--Security measures.
Computer networks.
False personation--Prevention.
False personation.
Physical Description:
1 online resource (xxix, 618 pages) : illustrations (some color)
Edition:
1st edition
Place of Publication:
Waltham, MA : Syngress, 2014.
Language Note:
English
System Details:
text file
Summary:
"Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support"-- Provided by publisher.
Contents:
Machine generated contents note: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION 2.
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
Description based on print version record.
ISBN:
9780124104334
0124104339
OCLC:
870339997

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account