-
Okta Administration: Up and Running
Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API.... -
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Author Morey J. Haber , Darran Rolls
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accou....
Release Date 2019/12 -
Computational Economics: Heterogeneous Agent Modeling
Author Blake LeBaron , Cars Hommes
Handbook of Computational Economics: Heterogeneous Agent Modeling, Volume Four, focuses on heterogeneous agent models, emphasizing recent advances in macroeconomics (including DSGE), finance, empirical validation and experiments, networks and related applications. ....
Release Date 2018/06 -
Identity, Authentication, and Access Management in OpenStack
Author Brad Topol , Henry Nash , Steve Martinelli
Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the....
Release Date 2015/12 -
Author Chris A. Ortiz
A powerful and effective Lean tool, 5S can help prevent company failure and launch an organization into world-class operational excellence. Until now, however, there has been a need for a book with detailed step-by-step guidelines on how to properly implement 5S (S....
Release Date 2015/08 -
Identity Shift: Where Identity Meets Technology in the Networked-Community Age
Author Christina James , Allison Cerra
Explore the intersection of technology and identityDoes technology cause a shift in how we perceive our relationships and ourselves?To find the answer, global communications leader Alcatel-Lucent commissioned an extensive research study. Subjects crossed geographic,....
Release Date 2011/11 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
The Truth About Identity Theft
Author Jim Stickley
Praise for The Truth About Identity Theft“This book will open your eyes, scare you smart, and make you think twice. Identity theft can happen to you and this book is a must read. Jim Stickley tells you why and how you need to protect yourself.”Matt Lauer, Anchor, TO....
Release Date 2008/08 -
Author Phillip J. Windley
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs a....
Release Date 2005/08