
- 234 pages
- English
- PDF
- Available on iOS & Android
About this book
In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Copyright
- About the Authors
- Contents
- Foreword
- Introduction
- Chapter 1: Identity
- Chapter 2: Managing Identities andIdentity Stores
- Chapter 3: Directories
- Chapter 4: Authentication and Access Control
- Chapter 5: Provisioning
- Chapter 6: Role-Based Access Control
- Chapter 7: Single Sign-on and Federated Authentication
- Chapter 8: Governance, Risk, and Compliance
- Chapter 9: Implementation and Roadmap
- Chapter 10: Public Key Infrastructure
- Chapter 11: Electronic Identity Smartcards
- Appendix A: Case Scenario
- Appendix B: Standards
- Appendix C: Glossary
- Appendix D: Public Key Cryptography Standards
- Appendix E: X.509 Specification
- Appendix F: Key Lengths
- Index
- Back Cover