To see the other types of publications on this topic, follow the link: Identity access management.

Books on the topic 'Identity access management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Identity access management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Group, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

G, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. RAND, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

California. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Senate Publications, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Weisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Weisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Weisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Vasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. IBM Corp., International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vasfi, Gucer, and International Business Machines Corporation. International Technical Support Organization., eds. Deployment guide series. IBM International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Peter, Alexender, Gunasekaran Manogaran, and Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cybersecurity and Identity Access Management. Springer, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Isaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ramey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

OAuth 2.0 Identity and Access Management Patterns. Packt Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Moffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Identity Management for Internet of Things. River Publishers, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Identity Management for Internet of Things. River Publishers, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Haber, Morey J., and Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress L. P., 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Paschoud, John, Simon McLeish, Masha Garibyan, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Paschoud, John, Simon McLeish, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Access and identity management for libraries: Controlling access to online information. Facet, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Blokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Oauth 2. 0 Identity and Access Management Patterns. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Digital identity and access management: Technologies and frameworks. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Blokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Blokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Understanding SAP NetWeaver Identity management. SAP and Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Redbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Access control systems: Security, identity, management, and trust models. Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Access control systems: Security, identity, management, and trust models. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Schmidt, Klaus, and Alexander Tsolkas. Rollen und Berechtigungskonzepte: Identity- und Access-Management im Unternehmen. Springer Vieweg, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Benantar, Messaoud. Access Control Systems: Security, Identity Management and Trust Models. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Identity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Keung, Alex Chi. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities. IGI Global, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Privacy & identity management: Data protection issues in relation to networked organisations utilizing identity management systems. Senter for rettsinformatikk, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Martinelli, Steve. Identity, authentication, and access management in OpenStack: Implementing and deploying Keystone, OpenStack's identity service. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!