eBooks-it.org Logo
eBooks-IT.org Inner Image

Designing an IAM Framework

With Oracle Identity and Access Management Suite

Designing an IAM Framework Image

Book Details:

Publisher:McGraw-Hill Osborne Media
Series: McGraw Hill
Author:Jeff Scheidel
Edition:1
ISBN-10:0071741372
ISBN-13:9780071741378
Pages:368
Published:Jul 26 2010
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.3 MB

Book Description:

Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business intelligence reporting techniques are also covered in this comprehensive resource. Establish company requirements and develop implementation plans Build and execute your identity business case Set up accounts, roles, and provisioning workflows using Oracle Identity Manager and Analysis Authenticate and authorize users with Oracle Access Manager Enact strong authorization policies using Oracle Entitlements Server Identify anomalous behavior and create proactive fraud prevention rules with Oracle Adaptive Access Manager Enforce regulatory compliance and generate audit-ready reports Learn about latest additions from the acquired Sun stack

Download Link:

Related Books:

PHP 5 CMS Framework Development

Expert insight and practical guidance to creating an efficient, flexible, and robust framework for a PHP 5-based content management system
PHP 5 CMS Framework Development Image
This book takes you through the creation of a working architecture for a PHP 5-based content management system, stepping you through the design and major implementation issues. This book is for professional PHP developers who either already use an in-house developed CMS, or are developing one, and want a thorough explanation of solutions to the common issues faced in CMS development, or simply want a working framework on which to build. The reader needs to be confident working with PHP 5 object-oriented programming....

Making Great Games

An Insider's Guide to Designing and Developing the World's Greatest Video Games
Making Great Games Image
Join videogame industry veteran Michael Thornton Wyman on a series of detailed, behind-the-scenes tours with the teams that have made some of the most popular and critically acclaimed videogames of the modern era. Drawing on insider's perspectives from a wide variety of teams, learn about the creation of a tiny, independent game project (World of Goo), casual game classics (Diner Dash, Bejeweled Twist), the world's most popular social game (FarmVille) as well as the world's most popular MMORPG (World of Warcraft), PC titles (Half Life 2) to AAA console games (Madden NFL 10), and modern-day masterpieces (Little Big Planet, Rock Band, Uncharted 2: Among Thieves). Hear directly from the creators about how these games were made, and learn from their stor...

Designing BSD Rootkits

An Introduction to Kernel Hacking
Designing BSD Rootkits Image
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the informatio...



2007 - 2021 © eBooks-IT.org