Books on the topic 'Identity and access management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Identity and access management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Full textRamey, Kenneth. Pro Oracle Identity and Access Management Suite. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1521-0.
Full textTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textOrondo, Peter O. Enterprise identity and access management engineering: Principles of organizational information authenticity. Information Science Reference, 2010.
Find full textPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.
Find full textGroup, Butler, ed. Identity and access management: Building a security framework using single sign-on and authentication technology. Butler Direct Limited, 2003.
Find full textG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. RAND, 2013.
Find full textCalifornia. Legislature. Senate. Committee on Transportation. Stopping identity fraud at the Department of Motor Vehicles: Transcript. Senate Publications, 2000.
Find full textWeisman, Steve. 50 Ways to Protect Your Identity and Your Credit. Pearson Education, 2005.
Find full textWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.
Find full textWeisman, Steve. 50 ways to protect your identity and your credit: Everything you need to know about identity theft, credit cards, credit repair, and credit reports. Pearson/Prentice Hall, 2005.
Find full textWu, Steven, and Sanjeeva P. Kalva, eds. Dialysis Access Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09093-1.
Full textWu, Steven, Sanjeeva Kalva, Harold Park, Chieh Suai Tan, and Gerald A. Beathard, eds. Dialysis Access Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52994-9.
Full textWilliams, Kristine. Access management manual. Transportation Research Board of the National Academies, 2014.
Find full textUnited States. Bureau of Land Management. Wyoming State Office. Access management policy. The Office, 1991.
Find full textPeter, Alexender, Gunasekaran Manogaran, and Bharat S. Rawal. Cybersecurity and Identity Access Management. Springer, 2022.
Find full textIsaca. Identity and Access Management Audit Program. Information Systems Audit and Control Association, 2022.
Find full textMoffatt, Simon. Consumer Identity and Access Management: Design Fundamentals. Independently Published, 2021.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textMahalle, Parikshit N., and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2022.
Find full textHaber, Morey J., and Darran Rolls. Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress, 2019.
Find full textIdentity Attack Vectors: Implementing an Effective Identity and Access Management Solution. Apress L. P., 2024.
Find full textPaschoud, John, Simon McLeish, Masha Garibyan, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2014.
Find full textPaschoud, John, Simon McLeish, and Mariam Garibyan. Access and Identity Management for Libraries: Controlling Access to Online Information. Facet Publishing, 2017.
Find full textAccess and identity management for libraries: Controlling access to online information. Facet, 2006.
Find full textBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textNickel, Jochen. Mastering Identity and Access Management with Microsoft Azure. Packt Publishing, 2016.
Find full textOauth 2. 0 Identity and Access Management Patterns. Packt Publishing, Limited, 2013.
Find full textDigital identity and access management: Technologies and frameworks. Information Science Reference, 2012.
Find full textBlokdyk, Gerardus. Identity and Access Management Complete Self-Assessment Guide. Createspace Independent Publishing Platform, 2017.
Find full textBlokdyk, Gerardus. Identity Access Management a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textBucker, Axel. Identity Management Design Guide With IBM Tivoli Identity Manager. Vervante, 2005.
Find full textRedbooks, IBM. Identity And Access Management Solutions Using Websphere Portal V5.1, Tivoli Identity Manager V4.5.1, And Tivoli Access Manager. Ibm, 2005.
Find full textAccess control systems: Security, identity, management, and trust models. Springer, 2006.
Find full textAccess control systems: Security, identity, management, and trust models. Springer, 2005.
Find full textSchmidt, Klaus, and Alexander Tsolkas. Rollen und Berechtigungskonzepte: Identity- und Access-Management im Unternehmen. Springer Vieweg, 2017.
Find full textBenantar, Messaoud. Access Control Systems: Security, Identity Management and Trust Models. Springer, 2010.
Find full textIdentity and Access Management: Business Performance Through Connected Intelligence. Elsevier Science & Technology Books, 2013.
Find full textKeung, Alex Chi. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities. IGI Global, 2018.
Find full text