Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.
In an unprecedented exploration of space and power in rural Xinjiang, a Chinese region home to the Muslim population of the Uyghurs, this book adopts a grounded theory approach and a trans-ethnic perspective into the complex and sensitive topic of land issues and agricultural land evictions in Xinjiang Uyghur Autonomous Region. By...
The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this certification is to provide professional-level recognition to network engineers in the design and implementation of Cisco secure networks. This...
Maximize on the power of WebSphere Portal to build and deploy portals
If you use, develop, manage, or administer WebSphere applications, you are probably already building or managing Web portals–or well on your way to doing so. With this comprehensive book, you’ll discover how these portals bring together important functions such...
An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.
This book is intended for IT administrators to get a handle on SharePoint Foundation and is an
update of Mastering Windows SharePoint Services 3.0. It is meant to be used both as a reference
for overworked network administrators who don’t have a lot of time to spare slogging through
articles and forums, and as a cover-to-cover...
In 2013, the American Psychiatric Association (APA) updated its Diagnostic
and Statistical Manual of Mental Disorders (today known as DSM-5), replac
ing the term “gender identity disorder” with “gender dysphoria” (Beredjick
2012). This change did not receive as much attention as the APA’s...
Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...
Conventional wisdom of the "software stack" approach to building applications may no longer be relevant. Enterprises are pursuing new ways of organizing systems and processes to become service oriented and event-driven. Leveraging existing infrastructural investments is a critical aspect to the success of companies both large and...