Bücher zum Thema „Identity access management“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Identity access management" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Rawal, Bharat S., Gunasekaran Manogaran und Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Der volle Inhalt der QuellePremdeep, Banga, und Carroll Brandon, Hrsg. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Den vollen Inhalt der Quelle findenRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Der volle Inhalt der QuellePohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Den vollen Inhalt der Quelle findenAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Den vollen Inhalt der Quelle findenDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Den vollen Inhalt der Quelle findenInternational Business Machines Corporation. International Technical Support Organization, Hrsg. Identity management design guide with IBM Tivoli identity manger. 3. Aufl. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Den vollen Inhalt der Quelle findenInternational Business Machines Corporation. International Technical Support Organization, Hrsg. Identity management design guide with IBM Tivoli identity manager. 4. Aufl. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Den vollen Inhalt der Quelle findenAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Den vollen Inhalt der Quelle findenUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Den vollen Inhalt der Quelle findenTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Boca Raton, Fl: Auerbach Pub, 2007.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Den vollen Inhalt der Quelle findenPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3. Aufl. Boca Raton, Fla: Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenMechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.
Den vollen Inhalt der Quelle findenGroup, Butler, Hrsg. Identity and access management: Building a security framework using single sign-on and authentication technology. [Hull]: Butler Direct Limited, 2003.
Den vollen Inhalt der Quelle findenG, Straus Susan, Hrsg. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Den vollen Inhalt der Quelle findenCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Sacramento, CA: Senate Publications, 2000.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Upper Saddle River: Pearson Education, 2005.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Den vollen Inhalt der Quelle finden50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Den vollen Inhalt der Quelle findenVasfi, Gucer, und International Business Machines Corporation. International Technical Support Organization., Hrsg. Deployment guide series. [Austin, Tex.]: IBM Corp., International Technical Support Organization, 2006.
Den vollen Inhalt der Quelle findenVasfi, Gucer, und International Business Machines Corporation. International Technical Support Organization., Hrsg. Deployment guide series. [United States?]: IBM International Technical Support Organization, 2006.
Den vollen Inhalt der Quelle findenF, Howard-Hamilton Mary, Cooper Diane L, ERIC Clearinghouse on Higher Education, Association for the Study of Higher Education und George Washington University, Hrsg. Identity development of diverse populations: Implications for teaching and administration in higher education. San Francisco, CA: Jossey-Bass, 2003.
Den vollen Inhalt der Quelle findenPeter, Alexender, Gunasekaran Manogaran und Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Den vollen Inhalt der Quelle findenIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Den vollen Inhalt der Quelle findenIdentity Management for Internet of Things. River Publishers, 2015.
Den vollen Inhalt der Quelle findenMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Den vollen Inhalt der Quelle findenOAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.
Den vollen Inhalt der Quelle findenRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., und Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., und Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., und Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenHaber, Morey J., und Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Den vollen Inhalt der Quelle findenPaschoud, John, Simon McLeish, Masha Garibyan und Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Den vollen Inhalt der Quelle findenPaschoud, John, Simon McLeish und Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenIdentity Management Advanced Design for IBM Tivoli Identity Manager. Vervante, 2006.
Den vollen Inhalt der Quelle finden(Editor), Axel Bucker, Hrsg. Identity Management Design Guide With IBM Tivoli Identity Manager. IBM.Com/Redbooks, 2003.
Den vollen Inhalt der Quelle findenBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Den vollen Inhalt der Quelle findenRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Den vollen Inhalt der Quelle findenAccess control systems: Security, identity, management, and trust models. New York, NY: Springer, 2006.
Den vollen Inhalt der Quelle findenIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Den vollen Inhalt der Quelle finden