Identity and access management : Business Performance Through Connected Intelligence / (Record no. 13469)
000 -LEADER | |
---|---|
fixed length control field | 02010cam a2200181 i 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780124081406 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Osmanoglu, T. Ertem. |
245 10 - TITLE STATEMENT | |
Title | Identity and access management : Business Performance Through Connected Intelligence / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 630 pages : |
Other physical details | illustrations ; |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computers |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | False personation |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Electronic Books |
Permanent Location | Date acquired | Collection code | Koha item type | Lost status | Shelving location | Current Location | Withdrawn status | Full call number |
---|---|---|---|---|---|---|---|---|
Cagayan State University - Carig Library | 2018-03-06 | E-Books | Electronic Books | E-Resource Section | Cagayan State University - Carig Library | 005.8 |