Зарегистрироваться
Восстановить пароль
FAQ по входу

Schwartz Michael, Machulak Maciej. Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

  • Файл формата pdf
  • размером 10,60 МБ
  • Добавлен пользователем
  • Отредактирован
Schwartz Michael, Machulak Maciej. Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Apress, 2019. — 377 р.
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.
The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it’s more valuable to prevent than to detect a security breach. That’s why Identity and Access Management (IAM) is a critical component of an organization’s security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as “suites” because IAM is not just one component. It’s a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация