Digital Identity : Unmasking Identity Management Architecture (IMA) by Phillip J. Windley (2005, Perfect)

Bargain Book Stores (1143637)
99,3% de votos positivos
Precio:
USD30,84
Aproximadamente26,46 EUR
+ USD10,92 de envío
Entrega prevista: lun. 20 oct. - lun. 3 nov.
Devoluciones:
No admite devoluciones pero está respaldado por la Garantía al cliente de eBay.
Estado:
Nuevo
Format: Paperback or Softback. Your Privacy. Condition Guide. Item Availability.

Acerca de este artículo

Product Identifiers

PublisherO'reilly Media, Incorporated
ISBN-100596008783
ISBN-139780596008789
eBay Product ID (ePID)48248258

Product Key Features

Number of Pages254 Pages
LanguageEnglish
Publication NameDigital Identity : Unmasking Identity Management Architecture (Ima)
SubjectSecurity / Online Safety & Privacy, Security / General, General
Publication Year2005
TypeTextbook
Subject AreaComputers
AuthorPhillip J. Windley
FormatPerfect

Dimensions

Item Height0.7 in
Item Weight11.6 Oz
Item Length9.2 in
Item Width7 in

Additional Product Features

Intended AudienceScholarly & Professional
LCCN2006-274918
Dewey Edition22
IllustratedYes
Dewey Decimal005.8
Table Of ContentDedication Foreword Preface Chapter 1: Introduction Chapter 2: Defining Digital Identity Chapter 3: Trust Chapter 4: Privacy and Identity Chapter 5: The Digital Identity Lifecycle Chapter 6: Integrity, Non-Repudiation, and Confidentiality Chapter 7: Authentication Chapter 8: Access Control Chapter 9: Names and Directories Chapter 10: Digital Rights Management Chapter 11: Interoperability Standards Chapter 12: Federating Identity Chapter 13: An Architecture for Digital Identity Chapter 14: Governance and Business Modeling Chapter 15: Identity Maturity Models and Process Architectures Chapter 16: Identity Data Architectures Chapter 17: Interoperability Frameworks for Identity Chapter 18: Identity Policies Chapter 19: Identity Management Reference Architectures Chapter 20: Building an Identity Management Architecture Colophon
SynopsisThe rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of theconcepts, issues, and technologies behind identity management architecture.How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay., Network-based, automated services have changed the way businesses operate, but not always for the better. Many companies are more concerned with risk than opportunity. Digital Identity shows how an enterprise-wide identity management architecture can provide security while ensuring that interactions with customers, employees, partners and suppliers are richer and more flexible., The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
LC Classification NumberTK5105.59.W56 2005

Todos los anuncios de este producto

¡Cómpralo ya!selected
Cualquier estadoselected
Nuevo
Usado
Todavía no hay valoraciones ni opiniones.
Sé el primero en escribir una opinión.