In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.
I didn't learn anything new from this book, but I wasn't expecting to since it is about my field of expertise. I read the book to determine if it was a suitable book to explain the main aspects of an identity management program. It is. It didn't cover every topic to my satisfaction (privileged account management and system accounts in particular) but it did a good job overall of explaining many of the different aspects of IAM. It also included real world examples and good exercises for the reader.