Facebook Twitter Pinterest <Einbetten>
Derzeit nicht verfügbar.
Ob und wann dieser Artikel wieder vorrätig sein wird, ist unbekannt.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 3 Bilder anzeigen

Identity and Access Management (Englisch) Taschenbuch – 3. Januar 2014

3,8 von 5 Sternen
5 Sterne
4
4 Sterne
2
3 Sterne
0
2 Sterne
3
1 Stern
0
3,8 von 5 Sternen 9 Rezensionen aus den USA.

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Taschenbuch
"Bitte wiederholen"
 
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Über den Autor und weitere Mitwirkende

Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young's Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta) (Kann Kundenrezensionen aus dem "Early Reviewer Rewards"-Programm beinhalten)

Amazon.com: 3.8 von 5 Sternen 9 Rezensionen
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Well written, comprehensive and focused on business enablement 18. Februar 2014
Von ptheb - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
I have had this book for more than 3 months now and have been able to read most of the chapters in this book. This is an extremely well written book and one of the very few books written on this topic.

In the last decade, the area of Identity and Access Management (IAM) has seen a huge momentum shift where an increasing number of security threats as well as regulatory drivers have forced organizations to take a fresh look at how they manage employee access. Even today, many organizations view IAM as a necessary evil to manage certain components of operational risk effectively. However, the author brings a broader perspective to the table where he discusses Identity & Access management as a business enabler that can help organizations improve their business performance (in addition to proactively addressing their regulatory drivers and managing access securely).

The author introduces a comprehensive IAM framework that covers all the key components of IAM and goes on to provide excellent examples of various elements of an effective IAM strategy as well as the latest trends in IAM throughout his book.

Overall, this is a great read and I would highly recommend this book to IAM practitioners,employees looking to introduce an IAM program in their organizations as well as professionals looking to develop skills in this rapidly growing area.
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Highly recommended for IAM professionals 4. Februar 2014
Von Gozde Aksay - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
Whether you want to familiarize yourself with the identity and access management area, or you are considering improvements in your current identity management solution, this book is an excellent read.

The book gives perspective on both technology and business sides of IAM space with comprehensive terminology and concepts, explanatory diagrams and real world examples. It also contains valuable discussions on how IAM has evolved over the years, common troubles with current implementations, and where IAM is headed.
6 von 8 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Must read if you are leading or soon to lead an IAM project 11. Dezember 2013
Von George Tsantes - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
There are many books on Identity and Access Management, but none with the holistic and pragmatic approach that this book brings to the discussion from extensive end-to-end implementation experience in the field solving real world issues. Anyone with an interest in the topic will appreciate this practical and insightful reference to designing and implementing identity and access management solutions that leverage best practices to deliver real business value. One interesting aspect is that there are real world sample work-products included in the book such as IAM build and implementation guides, and run books.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great for I&AM manager and folks at the pointy end 25. Dezember 2015
Von J. MCATEER - Veröffentlicht auf Amazon.com
Format: Taschenbuch
Excellent book. Thorough and well written. An valuable insight into what it takes to implement an I&AM project. Having worked on access remediation for the last few years this book has given me a lot of new insights. The people who gave it two stars clearly bought the wrong book for their needs so the negative rating makes no sense. The comment about the tables is also a bit odd as is clearly a problem with the device. The content in the tables is mostly excellent and readable on a small android tablet.
2 von 3 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Not for technical professionals. 25. September 2015
Von T. Brenner - Veröffentlicht auf Amazon.com
Format: Taschenbuch
In 600 pages on Identity and Access Management I hoped there would be some technical content. Alas this is a project management book for mid or entry level business folks only. It is way too long for higher level business managers and has no technical use for system engineering or administrators.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.