Securing the Perimeter

Available
0
StarStarStarStarStar
0Reviews

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, ef...

Read more
product_type_E-book
epub
Price
54.99 £

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, ef...

Read more
Follow the Author

Options

  • Formats: epub
  • ISBN: 9781484226018
  • Publication Date: 12 Dec 2018
  • Publisher: Apress
  • Product language: English
  • Drm Setting: DRM