Dieses Angebot wurde verkauft am So, 21. Sep um 02:36.
Digital Identity: Unmasking Identity Management Architecture (IMA)
Verkauft
Digital Identity: Unmasking Identity Management Architecture (IMA)
US $5,26US $5,26
Mo, 22. Sep, 02:36Mo, 22. Sep, 02:36

Digital Identity: Unmasking Identity Management Architecture (IMA)

baystatebooks
(61879)
Angemeldet als privater Verkäufer
Verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, finden daher keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
US $5,26
Ca.CHF 4,18
Artikelzustand:
Gut
    Versand:
    Kostenlos USPS Media MailTM.
    Standort: North Smithfield, Rhode Island, USA
    Lieferung:
    Lieferung zwischen Sa, 11. Okt und Sa, 18. Okt nach 94104 bei heutigem Zahlungseingang
    Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
    Rücknahme:
    Keine Rücknahme.
    Zahlungen:
         Diners Club

    Sicher einkaufen

    eBay-Käuferschutz
    Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
    Der Verkäufer ist für dieses Angebot verantwortlich.
    eBay-Artikelnr.:146840835102
    Zuletzt aktualisiert am 21. Sep. 2025 22:34:38 MESZAlle Änderungen ansehenAlle Änderungen ansehen

    Artikelmerkmale

    Artikelzustand
    Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
    Release Year
    2005
    Book Title
    Digital Identity: Unmasking Identity Management Architecture (...
    ISBN
    9780596008789
    Kategorie

    Über dieses Produkt

    Product Identifiers

    Publisher
    O'reilly Media, Incorporated
    ISBN-10
    0596008783
    ISBN-13
    9780596008789
    eBay Product ID (ePID)
    48248258

    Product Key Features

    Number of Pages
    254 Pages
    Language
    English
    Publication Name
    Digital Identity : Unmasking Identity Management Architecture (Ima)
    Subject
    Security / Online Safety & Privacy, Security / General, General
    Publication Year
    2005
    Type
    Textbook
    Subject Area
    Computers
    Author
    Phillip J. Windley
    Format
    Perfect

    Dimensions

    Item Height
    0.7 in
    Item Weight
    11.6 Oz
    Item Length
    9.2 in
    Item Width
    7 in

    Additional Product Features

    Intended Audience
    Scholarly & Professional
    LCCN
    2006-274918
    Dewey Edition
    22
    Illustrated
    Yes
    Dewey Decimal
    005.8
    Table Of Content
    Dedication Foreword Preface Chapter 1: Introduction Chapter 2: Defining Digital Identity Chapter 3: Trust Chapter 4: Privacy and Identity Chapter 5: The Digital Identity Lifecycle Chapter 6: Integrity, Non-Repudiation, and Confidentiality Chapter 7: Authentication Chapter 8: Access Control Chapter 9: Names and Directories Chapter 10: Digital Rights Management Chapter 11: Interoperability Standards Chapter 12: Federating Identity Chapter 13: An Architecture for Digital Identity Chapter 14: Governance and Business Modeling Chapter 15: Identity Maturity Models and Process Architectures Chapter 16: Identity Data Architectures Chapter 17: Interoperability Frameworks for Identity Chapter 18: Identity Policies Chapter 19: Identity Management Reference Architectures Chapter 20: Building an Identity Management Architecture Colophon
    Synopsis
    The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of theconcepts, issues, and technologies behind identity management architecture.How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay., Network-based, automated services have changed the way businesses operate, but not always for the better. Many companies are more concerned with risk than opportunity. Digital Identity shows how an enterprise-wide identity management architecture can provide security while ensuring that interactions with customers, employees, partners and suppliers are richer and more flexible., The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    LC Classification Number
    TK5105.59.W56 2005

    Artikelbeschreibung des Verkäufers

    Info zu diesem Verkäufer

    baystatebooks

    99,4% positive Bewertungen235 Tsd. Artikel verkauft

    Mitglied seit Mär 2017
    Antwortet meist innerhalb 24 Stunden
    Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
    We are your local used book store!
    Shop besuchenKontakt

    Detaillierte Verkäuferbewertungen

    Durchschnitt in den letzten 12 Monaten
    Genaue Beschreibung
    4.9
    Angemessene Versandkosten
    5.0
    Lieferzeit
    5.0
    Kommunikation
    5.0

    Verkäuferbewertungen (74'250)

    Alle Bewertungen ansehen