Normal view MARC view ISBD view

Identity management : a business perspective

By: Williamson, Graham
Publisher: Boise : MC Press, c2017.Description: x, 245 p. : ill. ; 23 cm.ISBN: 9781583474990Subject(s): Computer security | Computers -- Access controlDDC classification: 658.478 WI ID
Summary:
For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become an important core capability. This practical guide discusses the impacts of identity management on organizations from a businessperson's perspective. This book will help managers and CIOs understand: - Automating identity provisioning into your access control systems - How to evaluate the maturity of your identity management environment - The difference between authentication and authorization - Why federated authentication is so important and how to get it right - How roles and attributes are used to determine access control - The level of digital transformation that's coming in the management of consumer identities. - What we need to plan for in operational technology and the Internet of Things.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
658.478 WI ID (Browse shelf) Available T0057320
Total holds: 0

For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become an important core capability. This practical guide discusses the impacts of identity management on organizations from a businessperson's perspective. This book will help managers and CIOs understand: - Automating identity provisioning into your access control systems - How to evaluate the maturity of your identity management environment - The difference between authentication and authorization - Why federated authentication is so important and how to get it right - How roles and attributes are used to determine access control - The level of digital transformation that's coming in the management of consumer identities. - What we need to plan for in operational technology and the Internet of Things.

Powered by Koha