Get Free Shipping on orders over $79
Learning Digital Identity : Design, Deploy, and Manage Identity Architectures - Phillip J. Windley

Learning Digital Identity

Design, Deploy, and Manage Identity Architectures

By: Phillip J. Windley

eText | 10 January 2023 | Edition Number 1

At a Glance

eText


$53.89

or 4 interest-free payments of $13.47 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them.

By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses.

This book helps you:

  • Learn why functional online identity is still a difficult problem for most companies
  • Understand the purpose of digital identity and why it's fundamental to your business strategy
  • Learn why "rolling your own" digital identity infrastructure is a bad idea
  • Differentiate between core ideas such as authentication and authorization
  • Explore the properties of centralized, federated, and decentralized identity systems
  • Determine the right authorization methods for your specific application
  • Understand core concepts such as trust, risk, security, and privacy
  • Learn how digital identity and self-sovereign identity can make a difference for you and your organization
on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Cyberethics 8E - Richard A. Spinello

eTEXT

$83.67