Livros sobre o tema "Identity access management"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Identity access management".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Rawal, Bharat S., Gunasekaran Manogaran e Alexender Peter. Cybersecurity and Identity Access Management. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Texto completo da fontePremdeep, Banga, e Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.
Encontre o texto completo da fonteRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Texto completo da fontePohlman, Marlin B. Oracle Identity Management. London: Taylor and Francis, 2008.
Encontre o texto completo da fonteAccess and identity management for libraries: Controlling access to online information. London: Facet, 2006.
Encontre o texto completo da fonteDigital identity and access management: Technologies and frameworks. Hershey, PA: Information Science Reference, 2012.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manger. 3a ed. [Austin, Tex.]: IBM International Technical Support Organization, 2009.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization, ed. Identity management design guide with IBM Tivoli identity manager. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2009.
Encontre o texto completo da fonteAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Encontre o texto completo da fonteUnderstanding SAP NetWeaver Identity management. Boston: SAP and Galileo Press, 2010.
Encontre o texto completo da fonteTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Boca Raton, Fl: Auerbach Pub, 2007.
Encontre o texto completo da fonteOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteDesigning an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Encontre o texto completo da fontePohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3a ed. Boca Raton, Fla: Auerbach Publications, 2008.
Encontre o texto completo da fonteMechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.
Encontre o texto completo da fonteGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. [Hull]: Butler Direct Limited, 2003.
Encontre o texto completo da fonteG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Encontre o texto completo da fonteCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Sacramento, CA: Senate Publications, 2000.
Encontre o texto completo da fonteWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Upper Saddle River: Pearson Education, 2005.
Encontre o texto completo da fonteWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Encontre o texto completo da fonteWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Encontre o texto completo da fonte50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Encontre o texto completo da fonteVasfi, Gucer, e International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [Austin, Tex.]: IBM Corp., International Technical Support Organization, 2006.
Encontre o texto completo da fonteVasfi, Gucer, e International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. [United States?]: IBM International Technical Support Organization, 2006.
Encontre o texto completo da fonteF, Howard-Hamilton Mary, Cooper Diane L, ERIC Clearinghouse on Higher Education, Association for the Study of Higher Education e George Washington University, eds. Identity development of diverse populations: Implications for teaching and administration in higher education. San Francisco, CA: Jossey-Bass, 2003.
Encontre o texto completo da fontePeter, Alexender, Gunasekaran Manogaran e Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Encontre o texto completo da fonteIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Encontre o texto completo da fonteIdentity Management for Internet of Things. River Publishers, 2015.
Encontre o texto completo da fonteMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Encontre o texto completo da fonteOAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.
Encontre o texto completo da fonteRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.
Encontre o texto completo da fonteMahalle, Parikshit N., e Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Encontre o texto completo da fonteMahalle, Parikshit N., e Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Encontre o texto completo da fonteMahalle, Parikshit N., e Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Encontre o texto completo da fonteHaber, Morey J., e Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Encontre o texto completo da fontePaschoud, John, Simon McLeish, Masha Garibyan e Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Encontre o texto completo da fontePaschoud, John, Simon McLeish e Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Encontre o texto completo da fonteBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Encontre o texto completo da fonteNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Encontre o texto completo da fonteBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Encontre o texto completo da fonteBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Encontre o texto completo da fonteIdentity Management Advanced Design for IBM Tivoli Identity Manager. Vervante, 2006.
Encontre o texto completo da fonte(Editor), Axel Bucker, ed. Identity Management Design Guide With IBM Tivoli Identity Manager. IBM.Com/Redbooks, 2003.
Encontre o texto completo da fonteBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Encontre o texto completo da fonteRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Encontre o texto completo da fonteAccess control systems: Security, identity, management, and trust models. New York, NY: Springer, 2006.
Encontre o texto completo da fonteIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Encontre o texto completo da fonte