Annotation This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor.
In the third edition of this popular reference, identity management specialist Marlin B. Pohlman offers a definitive guide for corporate stewards struggling with the challenge of meeting regulatory compliance. He examines multinational regulations, delves into the nature of governance, risk, and compliance (GRC), and outlines a common taxonomy for the GRC space. He also cites standards that are used, illustrating compliance frameworks such as BSI, ITIL, and COBIT. The text focuses on specific software components of the Oracle Identity Management solution and includes elements of the Oracle compliance architecture.
"Cybercrime costs firms USD 1 trillion globally" - Headlines like this released by Reuters news agency on 29th January 2009 tend to regularly dominate international press lately. Surveys indicate that insiders like employees are one of the biggest threats to data security within organisations. As a result of improper account management users accumulate a number of excessive rights over time, resulting in the so called identity chaos. In the course of constantly growing IT infrastructures on the one hand, as well as the legislative regulations and law on the other hand, role-based Identity Management in particular has become a means of solving the identity chaos and meeting data security requirements. However, the central challenge organisations face in this context is how to construct a role catalogue for their Identity Management infrastructure. Some companies deal with this issue by applying predominantly manual procedures based on organisational and operational structures. These approaches are known as Role Engineering methodologies. Throughout the last few years, so-called Role Mining methodologies which use Data Mining techniques that cluster existing access rights of employees have evolved as alternative approaches. Recent findings show that a combination of Role Engineering and Role Mining is necessary to define a good collection of roles. This book gives insight into a hybrid tool-supported methodology for cleansing identity and account data and developing business roles for employees using Role Engineering and Role Mining techniques. Its main goals are to increase the overall user management data quality and support companies throughout a semi-automated process of defining roles. The methodology considers existing employee information and access privileges without neglecting organisational structures and business experts' knowledge about the organisation.
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
The implementation and exploitation of centralized, corporate-wide directories are among the top priority projects in most organizations. The need for a centralized directory emerges as organizations realize the overhead and cost involved in managing the many distributed micro and macro directories introduced in the past decade with decentralized client/server applications and network operating systems. Directories are key for successful IT operation and e-business application deployments in medium and large environments. IBM understands this requirement and supports it by providing directory implementations based on industry standards at no additional cost on all its major platforms and even important non-IBM platforms. The IBM Directory Server implements the Lightweight Directory Access Protocol (LDAP) standard that has emerged quickly in the past years as a result of the demand for such a standard. This IBM Redbooks publication will help you create a foundation of LDAP skills, as well as install and configure the IBM Directory Server. It is targeted at security architects and specialists who need to know the concepts and the detailed instructions for a successful LDAP implementation.
"This reference book brings together various perspectives on the usage and application of mobile technologies and networks in global business"--Provided by publisher.
"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile devices and wireless communications from over 400 leading researchers"--Provided by publisher.
Developments in network and switching technologies have made telecommu- cations systems and services far more data intensive. This can be observed in many telecommunications areas, such as network management, service mana- ment, and service provisioning. For example, in the area of network management the complexity of modern networks leads to large amounts of data on network topology, con?guration, equipment settings, etc. In addition, switches generate large amounts of data on network tra?c, faults, etc. In the area of service ma- gement it is the registration of customers, customer contacts, service usage (e.g. call detail records (CDRs)) that leads to large databases. For mobile services there is the additional tracking and tracing of mobile equipment. In the area of service provisioning there are the enhanced services like for example UMTS, the next generation of mobile networks, but also the deployment of data intensive services on broadband networks such as video-on-demand, high quality video conferencing, and e-commerce infrastructures. This results in very large databases growing at high rates especially in new service areas. The integration of network control, network management, and network administration also leads to a situation where database technology gets into the core of the network (e.g. in architectures like TMN, IN, and TINA).
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.*Explains nuts and bolts of Windows Server 2003 security*Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures*Draws on the experience of a lead consultant in the Microsoft security area