CSU-Carig

LRC WEB OPAC

Your Gateway to Our Library Collection

RedEagle Search

Identity and access management : Business Performance Through Connected Intelligence / (Record no. 13469)

000 -LEADER
fixed length control field 02010cam a2200181 i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780124081406
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Osmanoglu, T. Ertem.
245 10 - TITLE STATEMENT
Title Identity and access management : Business Performance Through Connected Intelligence /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 630 pages :
Other physical details illustrations ;
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION
520 ## - SUMMARY, ETC.
Summary, etc "Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets becomes increasingly complex. This challenge is further exacerbated by the increasingly collaborative nature of modern business, which requires granting access to organizational assets and information to external entities like business partners, suppliers, joint ventures, and customers. To remain flexible and adaptable, contain costs, and comply with laws and regulations, and thus maintain or enhance its competitive advantage. Initiatives to develop an effective Identity and access management (IAM) capability often suffer from a lack of organizational understanding and broad business support"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computers
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term False personation
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Books
Holdings
Permanent Location Date acquired Collection code Koha item type Lost status Shelving location Current Location Withdrawn status Full call number
Cagayan State University - Carig Library2018-03-06E-BooksElectronic Books E-Resource SectionCagayan State University - Carig Library 005.8

Cagayan State University University Library, Carig Campus
Tuguegarao City, Cagayan 3500 | www.csucarig.edu.ph

Powered by Koha