Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Contemporary identity and access man...
~
Ng, Alex Chi Keung, (1957-)
Contemporary identity and access management architecturesemerging research and opportunities /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Contemporary identity and access management architecturesby Alex Chi Keung Ng.
Reminder of title:
emerging research and opportunities /
Author:
Ng, Alex Chi Keung,
Published:
Hershey, Pennsylvania :IGI Global,[2018]
Description:
1 online resource (xviii, 241 p.)
Subject:
Computer networksSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4828-7
ISBN:
9781522548294 (ebook)
Contemporary identity and access management architecturesemerging research and opportunities /
Ng, Alex Chi Keung,1957-
Contemporary identity and access management architectures
emerging research and opportunities /[electronic resource] :by Alex Chi Keung Ng. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (xviii, 241 p.)
Includes bibliographical references and index.
Chapter 1. Identity and access management in the Internet age: the challenges -- Chapter 2. The roles of contemporary identity and access management standards: (r)evolution of IAM technologies -- Chapter 3. The role of identity management life cycle -- Chapter 4. The goals and requirements for contemporary identity and access management solutions -- Chapter 5. A Survey of contemporary identity and access management architectures -- Chapter 6. An introduction to commercial identity and access management solutions -- Chapter 7. The role of identity theft in identity and access management -- Chapter 8. Challenges and future development in identity and access management.
Restricted to subscribers or individual electronic text purchasers.
"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"--
ISBN: 9781522548294 (ebook)Subjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .N3484 2018e
Dewey Class. No.: 005.8/3
Contemporary identity and access management architecturesemerging research and opportunities /
LDR
:02085nmm a2200277 a 4500
001
532711
003
IGIG
005
20181030102858.0
006
m o d
007
cr cn
008
181116s2017 pau fob 001 0 eng d
010
$z
2017032399
020
$a
9781522548294 (ebook)
020
$a
9781522548287 (hardcover)
035
$a
(OCoLC)1018293754
035
$a
1071025242
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.N3484 2018e
082
0 4
$a
005.8/3
$2
23
100
1
$a
Ng, Alex Chi Keung,
$d
1957-
$e
author.
$3
807876
245
1 0
$a
Contemporary identity and access management architectures
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by Alex Chi Keung Ng.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (xviii, 241 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Identity and access management in the Internet age: the challenges -- Chapter 2. The roles of contemporary identity and access management standards: (r)evolution of IAM technologies -- Chapter 3. The role of identity management life cycle -- Chapter 4. The goals and requirements for contemporary identity and access management solutions -- Chapter 5. A Survey of contemporary identity and access management architectures -- Chapter 6. An introduction to commercial identity and access management solutions -- Chapter 7. The role of identity theft in identity and access management -- Chapter 8. Challenges and future development in identity and access management.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer networks
$x
Access control.
$3
213837
650
0
$a
Computers
$x
Access control.
$3
219159
650
0
$a
Online identity theft
$x
Prevention.
$3
582173
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4828-7
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000153528
電子館藏
1圖書
電子書
EB TK5105.59 N3484 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4828-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login