undrgrnd Cliquez ici Toys KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos Beauty Cliquez ici Acheter Fire Acheter Kindle Paperwhite cliquez_ici Jeux Vidéo Gifts
EUR 48,48
  • Tous les prix incluent la TVA.
Il ne reste plus que 11 exemplaire(s) en stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Identity and Access Manag... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Identity and Access Management: Business Performance Through Connected Intelligence (Anglais) Broché – 12 décembre 2013

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
"Veuillez réessayer"
EUR 48,48
EUR 48,48 EUR 56,39

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.

  • Focuses on real-word implementations
  • Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
  • Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
  • Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates

Biographie de l'auteur

Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young’s Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 6 commentaires
5 internautes sur 6 ont trouvé ce commentaire utile 
Must read if you are leading or soon to lead an IAM project 11 décembre 2013
Par George Tsantes - Publié sur Amazon.com
Format: Broché Achat vérifié
There are many books on Identity and Access Management, but none with the holistic and pragmatic approach that this book brings to the discussion from extensive end-to-end implementation experience in the field solving real world issues. Anyone with an interest in the topic will appreciate this practical and insightful reference to designing and implementing identity and access management solutions that leverage best practices to deliver real business value. One interesting aspect is that there are real world sample work-products included in the book such as IAM build and implementation guides, and run books.
1 internautes sur 1 ont trouvé ce commentaire utile 
Highly recommended for IAM professionals 4 février 2014
Par Gozde Aksay - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Whether you want to familiarize yourself with the identity and access management area, or you are considering improvements in your current identity management solution, this book is an excellent read.

The book gives perspective on both technology and business sides of IAM space with comprehensive terminology and concepts, explanatory diagrams and real world examples. It also contains valuable discussions on how IAM has evolved over the years, common troubles with current implementations, and where IAM is headed.
There are images that look like copy and paste from a slide deck and the ... 5 août 2015
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
I got the Kindle version and it is near worthless. There are images that look like copy and paste from a slide deck and the font is so small that you cannot read it. These images are the bases for the whole book. No option to zoom in on a Kindle paperwhite. Other than that, the content is ok. More theory than practical and no good real-world examples.
Well written, comprehensive and focused on business enablement 18 février 2014
Par ptheb - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
I have had this book for more than 3 months now and have been able to read most of the chapters in this book. This is an extremely well written book and one of the very few books written on this topic.

In the last decade, the area of Identity and Access Management (IAM) has seen a huge momentum shift where an increasing number of security threats as well as regulatory drivers have forced organizations to take a fresh look at how they manage employee access. Even today, many organizations view IAM as a necessary evil to manage certain components of operational risk effectively. However, the author brings a broader perspective to the table where he discusses Identity & Access management as a business enabler that can help organizations improve their business performance (in addition to proactively addressing their regulatory drivers and managing access securely).

The author introduces a comprehensive IAM framework that covers all the key components of IAM and goes on to provide excellent examples of various elements of an effective IAM strategy as well as the latest trends in IAM throughout his book.

Overall, this is a great read and I would highly recommend this book to IAM practitioners,employees looking to introduce an IAM program in their organizations as well as professionals looking to develop skills in this rapidly growing area.
Not for technical professionals. 25 septembre 2015
Par T. Brenner - Publié sur Amazon.com
Format: Broché
In 600 pages on Identity and Access Management I hoped there would be some technical content. Alas this is a project management book for mid or entry level business folks only. It is way too long for higher level business managers and has no technical use for system engineering or administrators.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?