Identity and Access Management: Business Performance Through Connected Intelligence
provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.
This book breaks down IAM into manageable components to ease systemwide implementation.
The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments.
The book also provides reusable templates and source code examples in Java, XML, and SPML.
Reviews
No Review Found