Search results
Results from the WOW.Com Content Network
Focus on IAM (Identity and Access Management) By Kiran Kumar Pabbathi. This is the 2016 Edition of Focus on IAM (Identity and Access Management), a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT.
We’ve listed the top 18 access management books professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the fields of access management and identity management.
The Highest-Rated Books for Identity Management Engineers. Book Title: Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0.
Mastering Identity and Access Management with Microsoft Azure - Second Edition: Empower users by managing and protecting identities and data, 2nd Edition 2nd ed. Edition by Jochen Nickel (Author)
Minu Joseph. February 19, 2024. SHARE ON : Understanding the pivotal role IT managers play in steering their organization's operations, we've handpicked a set of books exclusively for leaders like you. Let’s delve deep into the nuances of identity and access management (IAM).
This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments.
Identify and manage business drivers and architecture changes to transition between different scenarios. Understand and configure all relevant Identity and Access Management key features and concepts. Implement simple and complex directory integration, authentication, and authorization scenarios.
Featuring new and updated case-based questions, organized into seven core levels of Identity And Access Management IAM maturity, this Self-Assessment will help you identify areas in which Identity And Access Management IAM improvements can be made.
Book description. Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications. Key Features. Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples.
Ertem Osmanoglu. Newnes, Nov 19, 2013 - Computers - 648 pages. Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth...