Books on the topic 'Identity access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Identity access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Full textPremdeep, Banga, and Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Find full textRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Full textPohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Find full textAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Find full textDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3rd ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Find full textAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Find full textUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Find full textTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Boca Raton, Fl: Auerbach Pub, 2007.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Find full textDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Find full textPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Boca Raton, Fla: Auerbach Publications, 2008.
Find full textMechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.
Find full textGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. [Hull]: Butler Direct Limited, 2003.
Find full textG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Find full textCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Sacramento, CA: Senate Publications, 2000.
Find full textWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Upper Saddle River: Pearson Education, 2005.
Find full textWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Find full textWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Find full text50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Find full textVasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [Austin, Tex.]: IBM Corp., International Technical Support Organization, 2006.
Find full textVasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [United States?]: IBM International Technical Support Organization, 2006.
Find full textF, Howard-Hamilton Mary, Cooper Diane L, ERIC Clearinghouse on Higher Education, Association for the Study of Higher Education, and George Washington University, eds. Identity development of diverse populations: Implications for teaching and administration in higher education. San Francisco, CA: Jossey-Bass, 2003.
Find full textPeter, Alexender, Gunasekaran Manogaran, and Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Find full textIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Find full textIdentity Management for Internet of Things. River Publishers, 2015.
Find full textMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Find full textOAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.
Find full textRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textHaber, Morey J., and Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Find full textPaschoud, John, Simon McLeish, Masha Garibyan, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Find full textPaschoud, John, Simon McLeish, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Find full textBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Find full textBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textIdentity Management Advanced Design for IBM Tivoli Identity Manager. Vervante, 2006.
Find full text(Editor), Axel Bucker, ed. Identity Management Design Guide With IBM Tivoli Identity Manager. IBM.Com/Redbooks, 2003.
Find full textBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Find full textRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Find full textAccess control systems: Security, identity, management, and trust models. New York, NY: Springer, 2006.
Find full textIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Find full text