The Top Identity Management IAM Books You Should Be Reading

IAM Books

sometimes the key to technological advancement is decidedly old school.

You are reading: Identity and access management books

Identity and access management (iam) is an essential component of any company’s security kit; according to some experts, perhaps the most essential component. making sure your team understands your iam solution is another conversation. Your IT security team needs to understand how to manage new capabilities and priorities in your iam solution to better understand how to protect your business.

There are plenty of free resources available online (such as solution review best practice articles, solution directories, and buyer’s guides), and those resources are great, but sometimes it’s better to do things the old-fashioned way… and there are few resources that can match the full and in-depth details of iam’s good books.

We’ve compiled a short list of the best introductory iam books. we try to keep our selection of iam books within the last 5 years, and that each one is its own kind of rewarding reading experience.

identity and access management: business performance through connected intelligence

by ertem osmanoglu

one of iam’s classic books, frequently cited in our other book lists.

Osmanoglu IAM booksThis book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.

you can buy ertem osmanoglu identity and access management: business performance through connected intelligence here.

identity & access management: a systems engineering approach

by omondi orondo, doctorate

another classic, still one of iam’s most cited books.

The book is a powerful and novel approach to the analysis and synthesis of iam systems. it is motivated by the realization that current information systems practice in general, and identity and access management in particular, is increasingly divorced from its systems engineering fundamentals. For even the most innovative and resourceful practitioners, the architecture, design, implementation, and support of enterprise information technology systems have taken a complex inferential approach, driven by rule-based, algorithmic standards and protocols.

you can buy the identity of omondi orondo & access management: a systems engineering approach here.

Blue Team Handbook: Incident Response Edition: A Condensed Field Guide for the Cyber ​​Security Incident Responder

by don murdoch gse

This title isn’t one of your regular iam books, but it’s essential reading for members of the security team, regardless of the size of their company.

See also  Kent Haruf - Book Series In Order

the bthb includes essential information in an abridged manual format. Major topics include the incident response process, how attackers work, common incident response tools, a methodology for network analysis, common indicators of compromise, windows and linux analysis processes, tcpdump usage examples , use of snort ids, packet headers, and many other quick reference topics.

you can buy don murdoch’s blue team manual here.

information security management

by michael e. Whitman and Herbert J. matters

See Also: Our top books on bipolar disorder | Bipolar UK

the third edition includes updated information on changes in the field, such as revised sections on national and international laws and international standards such as the iso 27000 series. with these updates, information security management continues to offer a unique overview of information security from a management perspective, while staying abreast of industry changes and academic relevance.

you can buy michael e. Whitman and Herbert J. here mattord’s information security management.

identity management: a manual

by graham williamson, david yip and ilan sharoni

A solid source of training, whether for your team members or yourself!

providing strategies for overcoming this task in real-world terms, as well as questions to help focus on the key issues in each chapter, ranging from role-based access control to single sign-on and smart cards of electronic identities, this text provides students and professionals with a valuable tool to understand the complexity of identity in a virtual world.

You can buy Identity Management from Graham Williamson, David Yip and Ilan Sharoni: An Introduction here.

identity management: concepts, technologies and systems

by elisa bertino and kenji takahashi

Digital identity can be defined as the digital representation of known information about a specific person or organization. digital identity management technology is an essential function to personalize and enhance the network user experience, protect privacy, support accountability in transactions and interactions, and comply with regulatory controls.

you can buy elisa bertino and kenji takahashi’s identity management: concepts, technologies and systems here.

focus on iam (identity and access management)

by kiran kumar pabbathi

this is the 2016 edition of focus on iam (identity and access management), a unique book that addresses all facets of iam. It is written for all iam and information security professionals. This book does not focus on any specific iam tool or product; will provide detailed information on identity and access management regarding processes, technology, best practices, checklists, etc.

See also  8 Books To Read If You&039re a Psychology Student | Top Universities

You can purchase Kiran Kumar Pabbathi’s approach to iam (identity and access management) here.

digital identity: unmasking the identity management architecture (ima)

by phillip j. wind

another continuing classic in the solution review picks for iam books.

author phil windley compares ima to good urban planning. cities define uses and design standards to ensure that city buildings and services are consistent and viable. Within that context, individual buildings, or system architectures, function as part of the overall plan.

you can buy phillip j. windley digital identity: unmasking identity management architecture (ima) here.

digital identity management

by maryline laurent and samia bouzefrane

Within this multidisciplinary and scientific context, after a cross-analysis on the subject of digital identification, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, federation techniques of identities and privacy preservation solutions. The limitations of these solutions and the research problems in this field are also discussed to better understand the changes that are taking place.

You can buy Maryline Laurent and Samia Bouzefrane’s Digital Identity Management here.

identity management: a business perspective

by graham williamson

For business managers and directors, managing the identity data of employees, contractors, business partners, and customers has become an important core capability. This practical guide looks at the impacts of identity management on organizations from an entrepreneur’s perspective. This book will help managers and CIOs understand:

See Also: List of Sarah J. Maas Books in Order – Books Reading Order

• automate identity provisioning in your access control systems

• how to assess the maturity of your identity management environment

• the difference between authentication and authorization

You can buy Graham Williamson’s Identity Management: A Business Perspective here.

identity and data security for web development: best practices

by jonathan leblanc and tim messerschmidt

Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies required to create a data and identity secure interface, without compromising usability. You’ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that are sometimes naturally insecure.

You can shop Identity and Data Security for Web Development: Best Practices by Jonathan LeBlanc and Tim Messerschmidt here.

See also  Where to Donate Books: 25 Places to Try | Wealth of Geeks

digital identities: creating and communicating the self online

by rob cover

what is identity? there are plenty of iam books on how to protect your identity, but not as many on what it really means in the digital realm.

In the age of interactive, digital and networked media and communication, identity can be understood as even more complex, as digital users may play a larger role in creating their own online representations, as well as in the use of the capacity to co-create common and group identity narratives through interactivity and the proliferation of audiovisual content generated by users online.

you can buy rob cover digital identities: creating and communicating the self online here.

digital identity management: technological, business and social implications

by david birch

Companies need to see identity as part of their business processes. this book is a good reminder of that.

digital identity management, based on the work of the annual london digital identity forum, offers a broad perspective on the subject and explores the current technology available for identity management, its applications within business and its importance in broader debates on identity. , society and law. This is an essential introduction for organizations looking to use identity to get closer to customers; for those in government at all levels struggling with online delivery of specific services; as well as those concerned with the broader issues of identity, rights, the law, and potential risks.

You can buy David Birch’s Digital Identity Management: Technological, Business and Social Implications here.

digital literacy: an introduction to media, identity and the evolution of technology

by susan wiesinger and ralph beliveau

This book is to show that iam books don’t necessarily have to be about security to be valuable.

The internet, the world wide web, and digital devices have fundamentally changed the way people communicate, affecting everything from business, school, family, religion, and democracy. This textbook takes a comprehensive look at the evolution of media literacy to digital literacy to help students better understand the digitally filtered world they live in.

You can buy Susan Wiesinger and Ralph Beliveau’s Digital Literacy: An Introduction to Media, Identity, and the Evolution of Technology here.

See Also: List Of Brad Meltzer Books In Order – Mystery Sequels

now read: 19 best password managers for users and companies: the definitive list

Leave a Reply

Your email address will not be published. Required fields are marked *