Libros sobre el tema "Identity access management"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Identity access management".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Rawal, Bharat S., Gunasekaran Manogaran y Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Texto completoPremdeep, Banga y Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Buscar texto completoRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Texto completoPohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Buscar texto completoAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Buscar texto completoDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3a ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Buscar texto completoAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Buscar texto completoUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Buscar texto completoTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Boca Raton, Fl: Auerbach Pub, 2007.
Buscar texto completoOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Buscar texto completoPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3a ed. Boca Raton, Fla: Auerbach Publications, 2008.
Buscar texto completoMechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.
Buscar texto completoGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. [Hull]: Butler Direct Limited, 2003.
Buscar texto completoG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Buscar texto completoCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Sacramento, CA: Senate Publications, 2000.
Buscar texto completoWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Upper Saddle River: Pearson Education, 2005.
Buscar texto completoWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Buscar texto completoWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Buscar texto completo50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Buscar texto completoVasfi, Gucer y International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [Austin, Tex.]: IBM Corp., International Technical Support Organization, 2006.
Buscar texto completoVasfi, Gucer y International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [United States?]: IBM International Technical Support Organization, 2006.
Buscar texto completoF, Howard-Hamilton Mary, Cooper Diane L, ERIC Clearinghouse on Higher Education, Association for the Study of Higher Education y George Washington University, eds. Identity development of diverse populations: Implications for teaching and administration in higher education. San Francisco, CA: Jossey-Bass, 2003.
Buscar texto completoPeter, Alexender, Gunasekaran Manogaran y Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Buscar texto completoIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Buscar texto completoIdentity Management for Internet of Things. River Publishers, 2015.
Buscar texto completoMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Buscar texto completoOAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.
Buscar texto completoRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.
Buscar texto completoMahalle, Parikshit N. y Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Buscar texto completoMahalle, Parikshit N. y Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Buscar texto completoMahalle, Parikshit N. y Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Buscar texto completoHaber, Morey J. y Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Buscar texto completoPaschoud, John, Simon McLeish, Masha Garibyan y Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Buscar texto completoPaschoud, John, Simon McLeish y Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Buscar texto completoBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Buscar texto completoNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Buscar texto completoBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Buscar texto completoBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Buscar texto completoIdentity Management Advanced Design for IBM Tivoli Identity Manager. Vervante, 2006.
Buscar texto completo(Editor), Axel Bucker, ed. Identity Management Design Guide With IBM Tivoli Identity Manager. IBM.Com/Redbooks, 2003.
Buscar texto completoBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Buscar texto completoRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Buscar texto completoAccess control systems: Security, identity, management, and trust models. New York, NY: Springer, 2006.
Buscar texto completoIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Buscar texto completo