Identity and Access Management

Identity and Access Management : Business Performance Through Connected Intelligence

4.2 (10 ratings by Goodreads)
By (author) 

List price: US$59.95

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.
show more

Product details

  • Paperback | 648 pages
  • 190.5 x 233.68 x 33.02mm | 1,111.3g
  • Rockland, MA, United States
  • English
  • black & white illustrations, black & white tables, figures
  • 0124081401
  • 9780124081406
  • 1,251,904

Table of contents

SECTION 1 - Business Case and Current State

Chapter 1 - IAM Framework, Key Principles and Definitions

Chapter 2 - Business Requirements

Chapter 3 - Business Case Development

Chapter 4 - Current State and Capability Maturity

Chapter 5 - Key Challenges and Critical Success Factors

Chapter 6 - Case Studies

SECTION 2 - Future State and IAM Roadmap

Chapter 7 - Future State Definition

Chapter 8 - IAM Roadmap and Strategy

Chapter 9 - A Risk Based Approach to IAM

Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service)

Chapter 11 - IAM for End-user Computing Devices

Chapter 12 - Case Study

SECTION 3 - Implementation

Chapter 13 - Implementation Methodology and Approach

Chapter 14 - IAM Services

Chapter 15 - Identity Definition and On-boarding

Chapter 16 - Access Request and Approval

Chapter 17 - Provisioning and De-provisioning

Chapter 18 - Enforcement

Chapter 19 - Access Review and Certification

Chapter 20 - Reporting and Monitoring

Chapter 21 - Roles and Rules

Chapter 22 - IAM Product Selection

Chapter 23 - Implementation Case Studies
show more

About Ertem Osmanoglu

Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young's Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).
show more

Rating details

10 ratings
4.2 out of 5 stars
5 30% (3)
4 60% (6)
3 10% (1)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X