Identity and access management: Business Performance Through Connected Intelligence
"Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets be...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support".. |
Beschreibung: | Includes bibliographical references and index. - Computer security Weitere Ausgabe: Online-Ausg., Osmanoglu, Ertem: Identity and access management (MyiLibrary): |
Beschreibung: | xxix, 618 pages illustrations 24 cm |
ISBN: | 9780124081406 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042102047 | ||
003 | DE-604 | ||
005 | 20141105 | ||
007 | t | ||
008 | 141002s2014 ne a||| |||| 00||| eng d | ||
010 | |a 013036149 | ||
020 | |a 9780124081406 |9 978-0-12-408140-6 | ||
035 | |a (OCoLC)870188835 | ||
035 | |a (DE-599)BVBBV042102047 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-1049 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Osmanoglu, Ertem |e Verfasser |4 aut | |
245 | 1 | 0 | |a Identity and access management |b Business Performance Through Connected Intelligence |c Ertem Osmanoglu |
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a xxix, 618 pages |b illustrations |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Computer security | ||
500 | |a Weitere Ausgabe: Online-Ausg., Osmanoglu, Ertem: Identity and access management (MyiLibrary): | ||
520 | |a "Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support".. | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a False personation |x Prevention | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027542645&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027542645 |
Datensatz im Suchindex
_version_ | 1804152566387310592 |
---|---|
adam_text | IDENTITY AND ACCESS MANAGEMENT
/ OSMANOGLU, T. ERTEM.
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SECTION 1 - BUSINESS CASE AND CURRENT STATE CHAPTER 1 - IAM FRAMEWORK,
KEY PRINCIPLES AND DEFINITIONS CHAPTER 2 - BUSINESS REQUIREMENTS CHAPTER
3 - BUSINESS CASE DEVELOPMENT CHAPTER 4 - CURRENT STATE AND CAPABILITY
MATURITY CHAPTER 5 - KEY CHALLENGES AND CRITICAL SUCCESS FACTORS CHAPTER
6 - CASE STUDIES SECTION 2 - FUTURE STATE AND IAM ROADMAP CHAPTER 7 -
FUTURE STATE DEFINITION CHAPTER 8 - IAM ROADMAP AND STRATEGY CHAPTER 9 -
A RISK BASED APPROACH TO IAM CHAPTER 10 - A SERVICE BASED APPROACH TO
IAM (CLOUD / MANAGED SERVICE) CHAPTER 11 - IAM FOR END-USER COMPUTING
DEVICES CHAPTER 12 - CASE STUDY SECTION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Osmanoglu, Ertem |
author_facet | Osmanoglu, Ertem |
author_role | aut |
author_sort | Osmanoglu, Ertem |
author_variant | e o eo |
building | Verbundindex |
bvnumber | BV042102047 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
ctrlnum | (OCoLC)870188835 (DE-599)BVBBV042102047 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02399nam a2200397 c 4500</leader><controlfield tag="001">BV042102047</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141105 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">141002s2014 ne a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013036149</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124081406</subfield><subfield code="9">978-0-12-408140-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)870188835</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042102047</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Osmanoglu, Ertem</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity and access management</subfield><subfield code="b">Business Performance Through Connected Intelligence</subfield><subfield code="c">Ertem Osmanoglu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxix, 618 pages</subfield><subfield code="b">illustrations</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Computer security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Weitere Ausgabe: Online-Ausg., Osmanoglu, Ertem: Identity and access management (MyiLibrary):</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support"..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">False personation</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027542645&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027542645</subfield></datafield></record></collection> |
id | DE-604.BV042102047 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:12:45Z |
institution | BVB |
isbn | 9780124081406 |
language | English |
lccn | 013036149 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027542645 |
oclc_num | 870188835 |
open_access_boolean | |
owner | DE-1049 |
owner_facet | DE-1049 |
physical | xxix, 618 pages illustrations 24 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Osmanoglu, Ertem Verfasser aut Identity and access management Business Performance Through Connected Intelligence Ertem Osmanoglu Waltham, MA Syngress 2014 xxix, 618 pages illustrations 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index. - Computer security Weitere Ausgabe: Online-Ausg., Osmanoglu, Ertem: Identity and access management (MyiLibrary): "Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support".. Computer security Computers Access control Computer networks Security measures False personation Prevention LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027542645&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Osmanoglu, Ertem Identity and access management Business Performance Through Connected Intelligence Computer security Computers Access control Computer networks Security measures False personation Prevention |
title | Identity and access management Business Performance Through Connected Intelligence |
title_auth | Identity and access management Business Performance Through Connected Intelligence |
title_exact_search | Identity and access management Business Performance Through Connected Intelligence |
title_full | Identity and access management Business Performance Through Connected Intelligence Ertem Osmanoglu |
title_fullStr | Identity and access management Business Performance Through Connected Intelligence Ertem Osmanoglu |
title_full_unstemmed | Identity and access management Business Performance Through Connected Intelligence Ertem Osmanoglu |
title_short | Identity and access management |
title_sort | identity and access management business performance through connected intelligence |
title_sub | Business Performance Through Connected Intelligence |
topic | Computer security Computers Access control Computer networks Security measures False personation Prevention |
topic_facet | Computer security Computers Access control Computer networks Security measures False personation Prevention |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027542645&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT osmanogluertem identityandaccessmanagementbusinessperformancethroughconnectedintelligence |