-
Microsoft Identity and Access Administrator Exam Guide
Author Dwayne Natwick , Shannon Kuehn
This certification guide focuses on identity solutions and strategies that will help you prepare for Microsoft Identity and Access Administrator certification, while enabling you to implement what you've learned in real-world scenariosKey FeaturesDesign, implement, and operate identity and access m....
Release Date 2022/03 -
Exam Ref MS-101 Microsoft 365 Mobility and Security, 2nd Edition
Prepare for Microsoft Exam MS-101–and help demonstrate your real-world mastery of skills and knowledge needed to manage Microsoft 365 mobility, security, and related administration tasks. Designed for experienced IT professionals, Exam Ref focuses on the critical thinking and decision-making acumen .... -
Exam Ref MD-100 Windows 10, 2nd Edition
Prepare for the updated version of Microsoft Exam MD-100 and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, and maintain Windows 10 devices and technologies in an enterprise environment. Designed for Windows Administrators, Exam Ref focuses on the cri.... -
Okta Administration: Up and Running
Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API.... -
Identity Management with Biometrics
Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systemsKey FeaturesExplore the next iteration of identity protection and overcome real-world challengesUnderst.... -
Exam Ref MS-900 Microsoft 365 Fundamentals
Author Craig Zacker
Prepare for Microsoft Exam MS-900–and help demonstrate your mastery of real-world foundational knowledge about the considerations and benefits of adopting cloud services and the Software as a Service cloud model, as well as specific options and benefits of Microsof....
Release Date 2020/02 -
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Author Morey J. Haber , Darran Rolls
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accou....
Release Date 2019/12 -
Exam Ref MS-100 Microsoft 365 Identity and Services
Author Orin Thomas
Prepare for Microsoft Exam MS-100–and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking ....
Release Date 2019/07 -
Computational Economics: Heterogeneous Agent Modeling
Author Blake LeBaron , Cars Hommes
Handbook of Computational Economics: Heterogeneous Agent Modeling, Volume Four, focuses on heterogeneous agent models, emphasizing recent advances in macroeconomics (including DSGE), finance, empirical validation and experiments, networks and related applications. ....
Release Date 2018/06 -
Microsoft Identity Manager 2016 Handbook
Author Jeff Ingalls , David Steadman
A complete handbook on Microsoft Identity Manager 2016 ? from design considerations to operational best practicesAbout This BookGet to grips with the basics of identity management and get acquainted with the MIM components and functionalitiesDiscover the newly-intr....
Release Date 2016/07 -
Identity, Authentication, and Access Management in OpenStack
Author Brad Topol , Henry Nash , Steve Martinelli
Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the....
Release Date 2015/12 -
Author Chris A. Ortiz
A powerful and effective Lean tool, 5S can help prevent company failure and launch an organization into world-class operational excellence. Until now, however, there has been a need for a book with detailed step-by-step guidelines on how to properly implement 5S (S....
Release Date 2015/08 -
Cisco ISE for BYOD and Secure Unified Access
Author Aaron Woland , Jamey Heary
Plan and deploy identity-based secure access for BYOD and borderless networksUsing Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This bo....
Release Date 2013/06 -
Identity Shift: Where Identity Meets Technology in the Networked-Community Age
Author Christina James , Allison Cerra
Explore the intersection of technology and identityDoes technology cause a shift in how we perceive our relationships and ourselves?To find the answer, global communications leader Alcatel-Lucent commissioned an extensive research study. Subjects crossed geographic,....
Release Date 2011/11 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
Microsoft Forefront Security Administration Guide
Author Jesse Varsalone
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer....
Release Date 2009/02 -
The Truth About Identity Theft
Author Jim Stickley
Praise for The Truth About Identity Theft“This book will open your eyes, scare you smart, and make you think twice. Identity theft can happen to you and this book is a must read. Jim Stickley tells you why and how you need to protect yourself.”Matt Lauer, Anchor, TO....
Release Date 2008/08 -
Author Phillip J. Windley
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs a....
Release Date 2005/08