
Identity and Access Management
Business Performance Through Connected Intelligence
- 1st Edition - November 19, 2013
- Imprint: Syngress
- Author: Ertem Osmanoglu
- Language: English
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 1 0 4 3 3 - 4
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and d… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteIdentity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.
- Focuses on real-word implementations
- Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
- Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
- Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates
Chief Information Security Officers (CISOs), Directors of Information Security, information security consultants, Security Systems Architects, SAML developers, and Security Managers
- Edition: 1
- Published: November 19, 2013
- Imprint: Syngress
- No. of pages: 648
- Language: English
- eBook ISBN: 9780124104334
EO
Ertem Osmanoglu
Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young’s Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).
Affiliations and expertise
Ernst & Young Financial Services