Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
230 Security De-engineering
administration to accelerate return-on-investment and improve user
productivity,” then they had better be ready to actually look at the
benets in the light of the nasty IT details of client infrastructures.
Not all larger rms have a user management problem—they will be
using LDAP/AD as it is. Certainly, not every business will see a sig-
nicant nancial benet from use of an IdM product.
e IdM drumbeaters talk endlessly about integrating user accounts
across “multiple sites and applications,” but the reality is that not all
applications can be integrated under the IdM umbrella. Unfortunately,
many buyers of IdM solutions only discover this after their IdM prod-
uct acquisition. So end users have an IdM package ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355