Identity management: a primer (Record no. 203716)

000 -LEADER
fixed length control field 04229 a2200229 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160613b2009 xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781583470930
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number W4I2
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Williamson, Graham
9 (RLIN) 333397
245 ## - TITLE STATEMENT
Title Identity management: a primer
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Lewisville
Name of publisher, distributor, etc Mc Press
Date of publication, distribution, etc 2009
300 ## - PHYSICAL DESCRIPTION
Extent x, 220 p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Table of Contents:

Chapter 1 – Identity:
1. What Are the Components of a Person's Identity?
2. So Where Does Privacy Fit In?
3. Where Do Roles Fit Into the Concept of an Identity?
4. Can I Have Multiple Identities in an Identity Management Environment?;
5. Discussion Questions
6. Case Study

Chapter 2 - Managing Identities and Identity Stores:
7. Identities and User Accounts
8. What Is an Identity Store?
9. Why Multiple Stores Are a Fact of Life
10. Strategies for Multiple-Store Environments; Managing Roles
11. Role Modeling
12. Delegated Administration and Self-ServiceDiscussion Questions
13. Case Study

Chapter 3 – Directories:
14. Schemas and Namespace Planning
15. The Power of a DIT
16. Issues to Be Aware Of
17. Authoritative Sources
18. Directory and Database Design
19. Virtual Directory
20. The "M" Word
21. Selecting a Configuration
22. Discussion Questions
23. Case Study

Chapter 4 - Authentication and Access Control:
24. Methods of Authentication
25. Levels of Authentication
26. Authentication Assurance Levels
27. Registration Assurance Levels
28. Access Control
29. Discussion Questions
30. Case Study

Chapter 5 – Provisioning:
31. The Mark of a Robust Process
32. Zero-day StartBusiness System Issues
33. Workflow
34. The Role of Roles
35. The Benefits of Roles
36. Automating a Provisioning System
37. Sequential and Parallel Authorization
38. Discussion Questions
39. Case Study

Chapter 6 - Role-Based Access Control:
40. So What Is RBAC?
41. Why Is RBAC Important?
42. How Should RBAC Be Implemented?
43. Role Discovery
44. A Word of Caution
45. Discussion Questions; Case Study

Chapter 7 - Single Sign-on and Federated Authentication:
46. Single Sign-on for the Enterprise
47. Web SSO; Federated Authentication
48. Discussion Questions
49. Case Study

Chapter 8 - Governance, Risk, and Compliance:
50. HR Pattern-based Auditing Pattern Reporting
51. Business Policies (IT Controls and SoD Rules
52. Best Practices for System Cleansing and Auditing
53. Sample Graphs
54. Federated Authentication Auditing
55. Discussion Questions
56. Case Study

Chapter 9 - Implementation and Roadmap:
57. Getting Started
58. Setting Out; Physical Implementation
59. Typical Project Structure
60. Sample Roadmap
61. Navigating the Political Landscape
62. Challenges
63. Discussion Questions
64. Case Study

Chapter 10 - Public Key Infrastructure:
65. Why Do We Need PKI?
66. How Does PKI Work?
67. How Is PKI Used?
68. The Components
69. Key Generation
70. Certificate Management
71. Certificate IssuesImplementation Considerations
72. A Final Comment
73. Discussion Questions
74. Case Study

Chapter 11 - Electronic Identity Smartcards :
75. History
76. Interoperability
77. Privacy
78. Deployment Issues
79. An Ideal Platform
80. Discussion Questions
81. Case Study

520 ## - SUMMARY, ETC.
Summary, etc In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist.

(https://www.mc-store.com/search?q=9781583470930)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks - Security measures
9 (RLIN) 20001
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers - Access control
9 (RLIN) 160100
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
9 (RLIN) 56817
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Yip, David
9 (RLIN) 333398
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Sharoni, Ilan
9 (RLIN) 333399
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Spaulding, Kent
9 (RLIN) 333400
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent location Current location Shelving location Date acquired Source of acquisition Cost, normal purchase price Item location Full call number Barcode Date last seen Cost, replacement price Koha item type
          Non-fiction Vikram Sarabhai Library Vikram Sarabhai Library   2016-06-13 71 3530.00 Slot 98 (0 Floor, West Wing) 005.8 W4I2 192233 2016-06-13 3530.00 Books

Powered by Koha