Learning Digital Identity: Design, Deploy, and Manage Identity Architectures (Paperback or Softback). Condition Guide. Your source for quality books at reduced prices. Item Availability.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherO'reilly Media, Incorporated
ISBN-101098117697
ISBN-139781098117696
eBay Product ID (ePID)22058370302
Product Key Features
Number of Pages400 Pages
LanguageEnglish
Publication NameLearning Digital Identity : Design, Deploy, and Manage Identity Architectures
SubjectWeb / Web Services & APIs, Security / Online Safety & Privacy, Security / Networking, Economics / General
Publication Year2023
TypeTextbook
AuthorPhillip Windley
Subject AreaComputers, Business & Economics
FormatTrade Paperback
Dimensions
Item Height1.5 in
Item Weight28.1 Oz
Item Length9.2 in
Item Width7 in
Additional Product Features
LCCN2023-278047
Dewey Edition23
IllustratedYes
Dewey Decimal658.054678
SynopsisWhy is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you: Learn why functional online identity is still a difficult problem for most companies Understand the purpose of digital identity and why it's fundamental to your business strategy Learn why "rolling your own" digital identity infrastructure is a bad idea Differentiate between core ideas such as authentication and authorization Explore the properties of centralized, federated, and decentralized identity systems Determine the right authorization methods for your specific application Understand core concepts such as trust, risk, security, and privacy Learn how digital identity and self-sovereign identity can make a difference for you and your organization