Securing the Perimeter - PDF
Скачать полную версию книги "Securing the Perimeter - PDF"
The goal of this book is to demystify Identity and Access Management (IAM). There are thousands of professionals around the world helping companies with IAM, but that’s not enough. In this book we aim to increase the supply of IAM engineers by sharing some of the techniques and strategies developed over the last 20 years in a wide range of industries. Whether you are starting a small organization or deploying an IAM solution for a huge enterprise, the techniques presented in this book should help you deploy a solution based on Free Open Source Software (FOSS) to meet your needs. Nothing in this book is hard, and if you put the time into it, you can be an IAM professional too! Each chapter of this book will provide both theory and some pointers to software.
There is a lot of great Free Open Source Software (FOSS) for identity. This book will cover client and server software, web software and mobile software, libraries, and plugins. It is not a comprehensive survey of FOSS identity tools—there are too many to cover in one book! But hopefully, after finishing each chapter, you’ll be in a good place to start your research.