~~~~ In the second edition, we have added a new chapter on modeling of Access Reviews and Certification. When we started working on the Access and Review Certification models following the background that was already laid in the first edition, it was not clear at the outset that a Systems Engineering formulation could be found. It was therefore remarkable to find out that a very solid model was accessible. We invite new and old readers to take a look at the new Chapter 4. ~~~~ The book is a powerful, novel approach to the analysis and synthesis of IAM systems. It is motivated by the realization that the current practice of Information Systems in general, and Identity and Access Management in particular, is increasingly divorced from its Systems Engineering underpinnings. Even for the most innovative and resourceful practitioners, the architecture, design, implementation and support of enterprise Information Technology systems has taken a complex inferential approach, driven by algorithmic and rule based protocols and standards. This work creates a solid foundation for IAM by using established concepts from Systems Engineering, using systems representations for major IAM processes like authentication and authorization. Such systems formulations may then be used to analyze IAM systems in complicated organizations using established Systems Engineering methods. For example, the book shows that problems in IAM such as risk propagation and authentication processes that were heretofore analyzed in terms of prescriptive, algorithmic or empirical schemes, are indeed amenable to general theoretical treatment. The book is specifically designed to be accessible to the general IT practitioner. It is with this goal in mind that it teases out the concepts in a way that anyone with some college education will be able to understand.
"synopsis" may belong to another edition of this title.
Dr. Omondi Orondo is a principal at Acclaim Consulting Group, Inc, a firm specializing in the conceptualization, architecture, design, implementation and support of Identity and Access Management (IAM) products and systems. His other books include A Theoretical Analysis of Interstitial Hydrogen: Pressure-Composition-Temperature, Chemical Potential Enthalpy and Entropy, a work in the field of Engineering Physics based on his doctoral dissertation, and The Stirring of Stagnant Time, a fictional account of a monument to madness. He holds a B.Sc., M.Eng. and Ph.D. degrees from the Massachusetts Institute of Technology, all in Electrical Engineering and Computer Science.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Wonder Book, Frederick, MD, U.S.A.
Condition: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Seller Inventory # R05B-05531
Quantity: 1 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Print on Demand. Seller Inventory # I-9781499357066
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 448. Seller Inventory # C9781499357066
Quantity: Over 20 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. **Because of formatting issues in the Kindle Edition, the author recommends the paperback version** **Book also available from author's website: _id=440. Free shipping** In the second edition, we have added a new chapter on modeling of Access Reviews and Certification. When we started working on the Access and Review Certification models following the background that was already laid in the first edition, it was not clear at the outset that a Systems Engineering formulation could be found. It was therefore remarkable to find out that a very solid model was accessible. We invite new and old readers to take a look at the new Chapter 4. The book is a powerful, novel approach to the analysis and synthesis of IAM systems.It is motivated by the realization that the current practice of Information Systems in general, and Identity and Access Management in particular, is increasingly divorced from its Systems Engineering underpinnings. Even for the most innovative and resourceful practitioners, the architecture, design, implementation and support of enterprise Information Technology systems has taken a complex inferential approach, driven by algorithmic and rule based protocols and standards. This work creates a solid foundation for IAM by using established concepts from Systems Engineering, using systems representations for major IAM processes like authentication and authorization. Such systems formulations may then be used to analyze IAM systems in complicated organizations using established Systems Engineering methods. For example, the book shows that problems in IAM such as risk propagation and authentication processes that were heretofore analyzed in terms of prescriptive, algorithmic or empirical schemes, are indeed amenable to general theoretical treatment.The book is specifically designed to be accessible to the general IT practitioner. It is with this goal in mind that it teases out the concepts in a way that anyone with some college education will be able to understand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9781499357066
Quantity: 1 available