Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Socio-Economic Development in Xinjiang Uyghur Autonomous Region: Disparities and Power Struggle in China’s North-West
Socio-Economic Development in Xinjiang Uyghur Autonomous Region: Disparities and Power Struggle in China’s North-West

In an unprecedented exploration of space and power in rural Xinjiang, a Chinese region home to the Muslim population of the Uyghurs, this book adopts a grounded theory approach and a trans-ethnic perspective into the complex and sensitive topic of land issues and agricultural land evictions in Xinjiang Uyghur Autonomous Region. By...

CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification
from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this
certification is to provide professional-level recognition to network engineers in the design and
implementation of Cisco secure networks. This
...
Mastering IBM WebSphere Portal: Expert Guidance to Build and Deploy Portal Applications
Mastering IBM WebSphere Portal: Expert Guidance to Build and Deploy Portal Applications
Maximize on the power of WebSphere Portal to build and deploy portals

If you use, develop, manage, or administer WebSphere applications, you are probably already building or managing Web portals–or well on your way to doing so. With this comprehensive book, you’ll discover how these portals bring together important functions such...

Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Mastering Microsoft SharePoint Foundation 2010
Mastering Microsoft SharePoint Foundation 2010

This book is intended for IT administrators to get a handle on SharePoint Foundation and is an update of Mastering Windows SharePoint Services 3.0. It is meant to be used both as a reference for overworked network administrators who don’t have a lot of time to spare slogging through articles and forums, and as a cover-to-cover...

Organizing for Transgender Rights: Collective Action, Group Development, and the Rise of a New Social Movement (SUNY series in Queer Politics and Cultures)
Organizing for Transgender Rights: Collective Action, Group Development, and the Rise of a New Social Movement (SUNY series in Queer Politics and Cultures)
In 2013, the American Psychiatric Association (APA) updated its Diagnostic and Statistical Manual of Mental Disorders (today known as DSM-5), replac ing the term “gender identity disorder” with “gender dysphoria” (Beredjick 2012). This change did not receive as much attention as the APA’s...
Geeks On Call Security and Privacy: 5-Minute Fixes
Geeks On Call Security and Privacy: 5-Minute Fixes
Bringing order to the lawless frontier

Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...

Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS
Building Serverless Microservices in Python: A complete guide to building, testing, and deploying microservices using serverless computing on AWS

A practical guide for developing end-to-end serverless microservices in Python for developers, DevOps, and architects.

Key Features

  • Create a secure, cost-effective, and scalable serverless data API
  • Use identity management and authentication for a user-specific and secure...
Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations
Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations

Conventional wisdom of the "software stack" approach to building applications may no longer be relevant. Enterprises are pursuing new ways of organizing systems and processes to become service oriented and event-driven. Leveraging existing infrastructural investments is a critical aspect to the success of companies both large and...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy