Digital identity management
This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology.
Saved in:
| Other Authors: | Laurent, Maryline (Editor), Bouzefrane, Samia (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
London Oxford
ISTE Press Elsevier
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Identity and access management business performance through connected intelligence
by: Osmanoglu, Ertem
Published: (2013)
by: Osmanoglu, Ertem
Published: (2013)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
Impact of digital transformation on security policies and standards
Published: (2020)
Published: (2020)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Information protection playbook
Published: (2013)
Published: (2013)
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Multilevel modeling of secure systems in QoP-ML
by: Ksįeżopolski, Bogdan
Published: (2015)
by: Ksįeżopolski, Bogdan
Published: (2015)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
A NOVEL GRAPHICAL PASSWORD CLUSTERING METHOD FOR FAULT TOLERANCE MECHANISM
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
Dynamic analysis on pixel value graphical password scheme
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2017)
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2017)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
The hacker's handbook the strategy behind breaking into and defending network
by: Young 1968-
Published: (2004)
by: Young 1968-
Published: (2004)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Similar Items
-
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014) -
Identity and access management business performance through connected intelligence
by: Osmanoglu, Ertem
Published: (2013) -
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019) -
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015) -
AAA identity management security
by: Santuka, Vivek
Published: (2011)


