語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Contemporary identity and access man...
~
Ng, Alex Chi Keung, (1957-)
FindBook
Google Book
Amazon
博客來
Contemporary identity and access management architectures = emerging research and opportunities /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Contemporary identity and access management architectures/ by Alex Chi Keung Ng.
其他題名:
emerging research and opportunities /
作者:
Ng, Alex Chi Keung,
出版者:
Hershey, Pennsylvania :IGI Global, : [2018],
面頁冊數:
1 online resource (xviii, 241 p.)
內容註:
Chapter 1. Identity and access management in the Internet age: the challenges -- Chapter 2. The roles of contemporary identity and access management standards: (r)evolution of IAM technologies -- Chapter 3. The role of identity management life cycle -- Chapter 4. The goals and requirements for contemporary identity and access management solutions -- Chapter 5. A Survey of contemporary identity and access management architectures -- Chapter 6. An introduction to commercial identity and access management solutions -- Chapter 7. The role of identity theft in identity and access management -- Chapter 8. Challenges and future development in identity and access management.
標題:
Computer networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4828-7
ISBN:
9781522548294 (ebook)
Contemporary identity and access management architectures = emerging research and opportunities /
Ng, Alex Chi Keung,1957-
Contemporary identity and access management architectures
emerging research and opportunities /[electronic resource] :by Alex Chi Keung Ng. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (xviii, 241 p.)
Includes bibliographical references and index.
Chapter 1. Identity and access management in the Internet age: the challenges -- Chapter 2. The roles of contemporary identity and access management standards: (r)evolution of IAM technologies -- Chapter 3. The role of identity management life cycle -- Chapter 4. The goals and requirements for contemporary identity and access management solutions -- Chapter 5. A Survey of contemporary identity and access management architectures -- Chapter 6. An introduction to commercial identity and access management solutions -- Chapter 7. The role of identity theft in identity and access management -- Chapter 8. Challenges and future development in identity and access management.
Restricted to subscribers or individual electronic text purchasers.
"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"--
ISBN: 9781522548294 (ebook)Subjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .N3484 2018e
Dewey Class. No.: 005.8/3
Contemporary identity and access management architectures = emerging research and opportunities /
LDR
:02085nmm a2200277 a 4500
001
2137872
003
IGIG
005
20181030102858.0
006
m o d
007
cr cn
008
181117s2017 pau fob 001 0 eng d
010
$z
2017032399
020
$a
9781522548294 (ebook)
020
$a
9781522548287 (hardcover)
035
$a
(OCoLC)1018293754
035
$a
1071025242
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.N3484 2018e
082
0 4
$a
005.8/3
$2
23
100
1
$a
Ng, Alex Chi Keung,
$d
1957-
$e
author.
$3
3310802
245
1 0
$a
Contemporary identity and access management architectures
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by Alex Chi Keung Ng.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (xviii, 241 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Identity and access management in the Internet age: the challenges -- Chapter 2. The roles of contemporary identity and access management standards: (r)evolution of IAM technologies -- Chapter 3. The role of identity management life cycle -- Chapter 4. The goals and requirements for contemporary identity and access management solutions -- Chapter 5. A Survey of contemporary identity and access management architectures -- Chapter 6. An introduction to commercial identity and access management solutions -- Chapter 7. The role of identity theft in identity and access management -- Chapter 8. Challenges and future development in identity and access management.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements, technologies, life cycle processes, and overview of present and future commercial Identity and Access Management systems"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer networks
$x
Access control.
$3
729719
650
0
$a
Computers
$x
Access control.
$3
584008
650
0
$a
Online identity theft
$x
Prevention.
$3
1581375
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4828-7
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9344566
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .N3484 2018e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入