Identity & Access Management: A Systems Engineering Approach

Identity & Access Management: A Systems Engineering Approach image
ISBN-10:

1499357060

ISBN-13:

9781499357066

Edition: 1
Released: May 03, 2014
Format: Paperback, 337 pages
to view more data

Description:

**Because of formatting issues in the Kindle Edition, the author recommends the paperback version** **Book also available from author's website: https://acclaimconsulting.com/?page_id=440. Free shipping**~~~~In the second edition, we have added a new chapter on modeling of Access Reviews and Certification. When we started working on the Access and Review Certification models following the background that was already laid in the first edition, it was not clear at the outset that a Systems Engineering formulation could be found. It was therefore remarkable to find out that a very solid model was accessible. We invite new and old readers to take a look at the new Chapter 4.~~~~The book is a powerful, novel approach to the analysis and synthesis of IAM systems.It is motivated by the realization that the current practice of Information Systems in general, and Identity and Access Management in particular, is increasingly divorced from its Systems Engineering underpinnings. Even for the most innovative and resourceful practitioners, the architecture, design, implementation and support of enterprise Information Technology systems has taken a complex inferential approach, driven by algorithmic and rule based protocols and standards. This work creates a solid foundation for IAM by using established concepts from Systems Engineering, using systems representations for major IAM processes like authentication and authorization. Such systems formulations may then be used to analyze IAM systems in complicated organizations using established Systems Engineering methods. For example, the book shows that problems in IAM such as risk propagation and authentication processes that were heretofore analyzed in terms of prescriptive, algorithmic or empirical schemes, are indeed amenable to general theoretical treatment.The book is specifically designed to be accessible to the general IT practitioner. It is with this goal in mind that it teases out the concepts in a way that anyone with some college education will be able to understand.

Low Price Summary






Top Bookstores


























We're an Amazon Associate. We earn from qualifying purchases at Amazon and all stores listed here.

DISCLOSURE: We're an eBay Partner Network affiliate and we earn commissions from purchases you make on eBay via one of the links above.

Want a Better Price Offer?

Set a price alert and get notified when the book starts selling at your price.

Want to Report a Pricing Issue?

Let us know about the pricing issue you've noticed so that we can fix it.