Bücher zum Thema „Identity access management“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Identity access management" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Der volle Inhalt der QuelleRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Der volle Inhalt der QuellePohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.
Den vollen Inhalt der Quelle findenTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Den vollen Inhalt der Quelle findenPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.
Den vollen Inhalt der Quelle findenGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.
Den vollen Inhalt der Quelle findenG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. RAND, 2013.
Den vollen Inhalt der Quelle findenCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Senate Publications, 2000.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Pearson Education, 2005.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.
Den vollen Inhalt der Quelle findenWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.
Den vollen Inhalt der Quelle findenVasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. IBM Corp., International Technical Support Organization, 2006.
Den vollen Inhalt der Quelle findenVasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. IBM International Technical Support Organization, 2006.
Den vollen Inhalt der Quelle findenPeter, Alexender, Gunasekaran Manogaran, and Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Den vollen Inhalt der Quelle findenCybersecurity and Identity Access Management. Springer, 2023.
Den vollen Inhalt der Quelle findenIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Den vollen Inhalt der Quelle findenRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.
Den vollen Inhalt der Quelle findenOAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.
Den vollen Inhalt der Quelle findenMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Den vollen Inhalt der Quelle findenIdentity Management for Internet of Things. River Publishers, 2015.
Den vollen Inhalt der Quelle findenIdentity Management for Internet of Things. River Publishers, 2015.
Den vollen Inhalt der Quelle findenHaber, Morey J., and Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Den vollen Inhalt der Quelle findenIdentity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress L. P., 2024.
Den vollen Inhalt der Quelle findenPaschoud, John, Simon McLeish, Masha Garibyan, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Den vollen Inhalt der Quelle findenPaschoud, John, Simon McLeish, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Den vollen Inhalt der Quelle findenAccess and identity management for libraries: Controlling access to online information. Facet, 2006.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Den vollen Inhalt der Quelle findenOauth 2. 0 Identity and Access Management Patterns. Packt Publishing, Limited, 2013.
Den vollen Inhalt der Quelle findenDigital identity and access management: Technologies and frameworks. Information Science Reference, 2012.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Den vollen Inhalt der Quelle findenBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Den vollen Inhalt der Quelle findenBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Den vollen Inhalt der Quelle findenUnderstanding SAP NetWeaver Identity management. SAP and Galileo Press, 2010.
Den vollen Inhalt der Quelle findenRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Den vollen Inhalt der Quelle findenAccess control systems: Security, identity, management, and trust models. Springer, 2006.
Den vollen Inhalt der Quelle findenAccess control systems: Security, identity, management, and trust models. Springer, 2005.
Den vollen Inhalt der Quelle findenSchmidt, Klaus, and Alexander Tsolkas. Rollen und Berechtigungskonzepte: Identity- und Access-Management im Unternehmen. Springer Vieweg, 2017.
Den vollen Inhalt der Quelle findenBenantar, Messaoud. Access Control Systems: Security, Identity Management and Trust Models. Springer, 2010.
Den vollen Inhalt der Quelle findenIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Den vollen Inhalt der Quelle findenKeung, Alex Chi. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities. IGI Global, 2018.
Den vollen Inhalt der Quelle findenPrivacy & identity management: Data protection issues in relation to networked organisations utilizing identity management systems. Senter for rettsinformatikk, 2007.
Den vollen Inhalt der Quelle findenMartinelli, Steve. Identity, authentication, and access management in OpenStack: Implementing and deploying Keystone, OpenStack's identity service. 2015.
Den vollen Inhalt der Quelle finden