

Instant online reading.
At a Glance
256 Pages
24.5 x 11.5 x 1.5
Paperback
RRP $66.50
$34.90
48%OFF
or 4 interest-free payments of $8.72 with
 orÂThe rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Industry Reviews
Foreword | |
Preface | |
Introduction | |
Business Opportunity | |
Digital Identity | |
Matters Using Digital Identity | |
The Business Context of Identity | |
Foundational Technologies for Digital Identity | |
Identity Management Architectures | |
Defining Digital Identity | |
The Language of Digital Identity | |
Identity Scenarios in the Physical World | |
Identity, Security, and Privacy Digital Identity | |
Perspectives Identity | |
Powershifts | |
Conclusion | |
Trust | |
What Is Trust? | |
Trust and Evidence | |
Trust and Risk | |
Reputation and Trust Communities | |
Conclusion | |
Privacy and Identity | |
Who's Afraid of RFID? | |
Privacy Pragmatism | |
Privacy Drivers | |
Privacy Audits | |
Privacy Policy | |
Capitalism | |
Anonymity and Pseudonymity | |
Privacy Principles Prerequisites | |
Conclusion | |
The Digital Identity | |
Lifecycle Provisioning Propagating | |
Using Maintaining Deprovisioning | |
Conclusion | |
Integrity, Non-Repudiation, and Confidentiality | |
Integrity Non-Repudiation Confidentiality | |
Conclusion | |
Authentication | |
Authentication and Trust | |
Authentication Systems | |
Authentication System Properties | |
Conclusion | |
Access Control Policy | |
First Authorization Patterns | |
Abstract | |
Authorization Architectures | |
Digital Certificates and Access Control | |
Conclusion | |
Names and Directories | |
Utah.gov: Naming and Directories | |
Naming Directories Aggregating | |
Directory Information | |
Conclusion | |
Digital Rights | |
Management Digital Leakage | |
The DRM Battle Apple iTunes: A Case Study in DRM | |
Features of DRM | |
DRM Reference | |
Architecture Trusted | |
Computing Platforms | |
Specifying Rights | |
Conclusion | |
Interoperability Standards | |
Standards and the Digital Identity | |
Lifecycle Integrity and Non-Repudiation: XML Signature | |
Confidentiality: XML Encryption | |
Authentication and Authorization Assertions Example SAML | |
Use Cases Identity | |
Provisioning Representing and Managing Authorization Policies | |
Conclusion | |
Federating Identity | |
Centralized Versus Federated Identity | |
The Mirage of Centralized Efficiency | |
Network Effects and Digital Identity | |
Management Federation in the Credit Card Industry | |
Benefits of Federated Identity | |
Digital Identity Standards | |
Three Federation Patterns | |
Conclusion | |
An Architecture for Digital Identity | |
Identity Management Architecture | |
The Benefits of an Identity Management Architecture | |
Success Factors | |
Roadblocks Identity Management | |
Architecture Components | |
Conclusion | |
Governance and Business Modeling | |
IMA Lifecycle | |
IMA Governance Model | |
Initial Steps Creating a Vision | |
IMA Governing Roles | |
Resources | |
What to Outsource Understanding the Business | |
Context Business | |
Function Matrix | |
IMA Principles | |
Conclusion | |
Identity Maturity Models and Process | |
Architectures | |
Maturity Levels | |
The Maturity Model | |
The Rights Steps at the Right Time | |
Finding Identity Processes | |
Evaluating Processes | |
A Practical Action Plan | |
Filling the Gaps with Best Practices | |
Conclusion | |
Identity Data Architectures | |
Build a Data Architecture Processes | |
Link Identities | |
Data Categorization Identity | |
Data Structure and Metadata Exchanging Identity | |
Data Principles for Identity Data | |
Conclusion | |
Interoperability Frameworks for Identity | |
Principles of a Good IF | |
Contents of an Identity IF | |
Example Interoperability Framework | |
A Word of Warning | |
Conclusion | |
Identity Policies | |
The Policy Stack | |
Attributes of a Good Identity Policy | |
Determining Policy Needs | |
Writing Identity Policies | |
An Identity Policy Suite | |
Assessing Identity Policies | |
Enforcement Procedures | |
Conclusion | |
Identity Management | |
Reference Architectures | |
Reference Architectures | |
Benefits and Pitfalls | |
Reference Architecture | |
Best Practices | |
Using a Reference Architecture | |
Components of a Reference Architecture | |
Technical Position Statements | |
Consolidated Infrastructure Blueprint | |
System Reference Architectures | |
Conclusion | |
Building an Identity Management | |
Architecture Scoping the Process | |
Which Projects Are Enterprise Projects? | |
Sequencing the IMA Effort | |
A Piece at a Time | |
Conclusion: Dispelling IMA Myths | |
Index | |
Foreword | |
Credits | |
Preface | |
Halo 2 Jumping | |
Add Height to All Your Jumps | |
Blast Yourself into the Air | |
Extend Your Jumping Distance | |
The Longest Unaided Halo 2 Jump | |
Extend Your Landing Points | |
Halo 2 Skulls | |
Find Your First Skull | |
Fight the Elite of the Elites | |
Eliminate the HUD | |
Find the Most Difficult Skull | |
Receive the Gift of Grenades | |
Throw a Grunt Birthday Party | |
Activate the Ammunition Handicap | |
Camouflage the Master Chief | |
Give All Enemies Active Camouflage | |
Make All Enemies Tougher | |
Change the Laws of Physics | |
Make the Grunts a Little Tougher | |
Teach Your Enemies to Take a Punch | |
Make Co-op Harder | |
Add a Twist to Your Shields | |
Halo 2 Easter Eggs | |
See the Grunts Dance with Macho Man | |
Locate Secret Messages in Multiplayer Maps | |
Uncover the Hidden Art Galleries | |
Read the Master Chief Poster | |
Customize the Zanzibar Signage | |
Kick Around a Soccer Ball | |
Collect the Hidden Sword on Outskirts | |
Hidden Swords on Delta Halo | |
Super Weapon on Metropolis | |
Gameplay Tricks | |
Change Split Screen View | |
Revert to Multiple Checkpoints | |
Get Out of Outskirts | |
Get Above Delta Halo | |
Get Out of Burial Mounds | |
Jump Out of Foundation | |
Get on Top of Lockout | |
Get on Top of Zanzibar | |
Warthog Trampoline | |
The Easy Way to the Beaver Creek Launcher | |
Halo 2 Glitches | |
Fly Like a Bird | |
Create a Giant Phantom MC | |
Give Yourself Infinite Camouflage | |
Overload the Game Engine | |
Find the Mysterious Super Jump | |
Get Unlimited Sword Energy | |
Drop Your Weapons | |
Teach a Scorpion to Fly | |
Create a Ring of Rockets | |
Slow Down Rockets | |
Hacking Setup and Software | |
Mod Your Maps with ADI | |
Use an Open Source Map Editor | |
Mod Maps with DotHalo | |
Sign Your Custom Maps | |
Hack Halo 2 by Hand | |
Share Your Saved Games | |
Remix Multiplayer Levels with Campaign Mode Objects | |
Weapon Mods | |
Become a Grenade Sniper | |
Change Your Clip Size | |
Push Your Friends Around | |
Swap Ammunition | |
Dual Wield Any Weapon | |
Death by Soccer Balls | |
Add 10x Zoom to Any Weapon | |
Lunge for the Sky | |
Clear the Zoom | |
Silence the Zoom | |
Change Grenade Explosions | |
Vehicle Mods | |
Exchange the Weapons on Your Vehicle | |
Fly with Ground-Locked Vehicles | |
Trick Out Your Ride | |
Pimp Out Your Ride with Tunes | |
Level Mods | |
Alter the Textures in a Level | |
Adjust the Halo 2 Lighting | |
Give Your Map Its Own Menu Image | |
Alter the Size of Objects in Your Maps | |
Turn Grenades into Skulls | |
Display Mods | |
Film High-Quality Videos and Machinima | |
Manually Remove Low-Level Textures | |
Improve Your View of the Battlefield | |
Customize the Halo 2 Splash Screen | |
Customize the Halo 2 Demo Videos | |
Gameplay Mods | |
Speed Walking | |
Crouch to the Sky | |
Jump for the Sky | |
Remove Sound | |
Change Halo 2's Machinery | |
Sit in the Bleachers | |
Give Yourself Super Powers | |
Create a Custom Game Variant | |
Halo 2 Remixed | |
Spend Some Time with the Zombies | |
Fight Your Way Through Much Squalor | |
Visit the Moon | |
Spend a Night in a Haunted Creek | |
Take a Walk in a Winter Wonderland | |
Blast It All to Bits | |
Crawl Around a Desert | |
See the Forest for the Trees | |
Break Out Some Wild Weaponry | |
Thrill to the Sights and Sounds of Zentation | |
Create Your Own Level Mods | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
ISBN: 9780596008789
ISBN-10: 0596008783
Series: O'Reilly Ser.
Published: 5th August 2005
Format: Paperback
Language: English
Number of Pages: 256
Audience: Professional and Scholarly
Publisher: O'Reilly Media, Inc, USA
Country of Publication: US
Dimensions (cm): 24.5 x 11.5 x 1.5
Weight (kg): 0.44
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.50
$60.90
OFF
This product is categorised by
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.O'Reilly
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Information Technology General IssueEthical & Social Aspects of IT
- Booktopia Publisher ServicesJohn Wiley & Sons Publishers UK
- BargainsNon-Fiction BargainsAutobiography and Biography Bargains