Angebote zu "Identity" (32 Treffer)

Kategorien

Shops

Identity and Access Management
45,99 € *
ggf. zzgl. Versand

Identity and Access Management: Controlling your Network provides you with a practical in-depth walk-through of how to plan, assess, design, and deploy IAM solutions, breaking down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step methodology for deploying IAM that has been successfully used in over 200 deployments, reusable templates and source code examples in Java, XML and SPML.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Identity and Access Management
45,99 € *
ggf. zzgl. Versand

Identity and Access Management: Controlling your Network provides you with a practical in-depth walk-through of how to plan, assess, design, and deploy IAM solutions, breaking down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step methodology for deploying IAM that has been successfully used in over 200 deployments, reusable templates and source code examples in Java, XML and SPML.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Lust, Men, and Meth: A Gay Man's Guide to Sex a...
9,95 € *
ggf. zzgl. Versand

Lust, Men, and Meth: A Gay Man's Guide to Sex and Recovery provides insight for gay men struggling with the issues of sex and recovery and for the professionals who work with them. The listener is equipped not only with essential information on the problems of drugs and sexuality, but also with solutions in the form of tools and resources that will support him along his path.The audiobook is unique in its blend of therapeutic perspectives of addiction and sex therapy from which Dr. Fawcett has integrated the most useful concepts and tools. Additionally, detailed case studies will assist clinicians who, in Dr. Fawcett's many trainings for professionals, have asked for material on substance use, identity, and sexuality in gay-identified men. These insights and tools will be helpful not only in the early stages of sobriety, but for an individual's continuing personal evolution of recovery as well.The book is divided into three parts to help guide the listener through this multifaceted topic:The first part - The Perfect Storm - examines how, through the release of dopamine and other neurotransmitters, methamphetamine has phenomenal power to change one’s mood and entice the user to ingest ever-increasing amounts of the drug. The role of excitement, risk, and even boredom are explored, along with the vulnerabilities of some gay men who find themselves feeling unattractive, left out, or disconnected and utilize meth to soothe these feelings. Finally, this part of the book explores the unfortunate intersection of meth, the gay community, and the rise of dangerous health concerns such as HIV/AIDS.The second part - Exploring the Sexual Universe - provides a sex therapist’s perspective on sexual desire and how eroticism develops in the brain, an elaborate world of sexual templates, scripts, and themes that methamphetamine penetrates and distorts. This section also highlights exciting discoveries of neurobiology and the direct impact of the 1. Language: English. Narrator: Tom Eagar. Audio sample: http://samples.audible.de/bk/acx0/180341/bk_acx0_180341_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 02.06.2020
Zum Angebot
Selected Database Architecture and Modelling
61,90 € *
ggf. zzgl. Versand

Data Architecture is intended for people in business management involved with corporate data issues and information technology decisions, ranging from data architects to IT consultants, IT auditors, and data administrators. It is also an ideal reference tool for those in a higher-level education process involved in data or information technology management. Recognizing that database representation sets the path for software, determines its flexibility, affects its quality, and influences whether it succeeds or fails, the text focuses on databases rather than programming. It is one of the first books to apply the popular patterns perspective to database systems and data models. It offers practical advice on the core aspects of applications and provides authoritative coverage of mathematical templates, antipatterns, archetypes, identity, canonical models, and relational database design.

Anbieter: Dodax
Stand: 02.06.2020
Zum Angebot
Biometric Watermarking Techniques
64,90 € *
ggf. zzgl. Versand

Biometric technologies can be used to verify or establish a person's identity. Protection of biometric data and templates is a crucial issue for the security of biometric systems, and biometric watermarking is introduced for this purpose. Watermarking introduces extra information into the biometric data which leads to certain image distortion. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. Biometric technologies have been used in federal applications such as access control, criminal identification, and border security.

Anbieter: Dodax
Stand: 02.06.2020
Zum Angebot
Enhancing Biometric Authentication Using Visual...
49,00 € *
ggf. zzgl. Versand

A reliable identity management system is urgently needed in order to combat the epidemic growth in identity theft and to meet the increased security requirements in a variety of applications. Biometric authentication establishes the identity of a person based on who he is", rather than what he knows" or what he possess . There are usually two very serious criticisms against biometric technology that have not been addressed satisfactorily, biometrics are not secrets and enrolled biometric templates are not revocable. The first fact implies that the attacker has a ready access to the legitimate biometric trait (e.g., facial image finger print of an enrolled user of the biometric system) and, therefore, could fraudulently inject it into the biometric system to gain access. The second fact implies that when a biometric trait has been compromised , the legitimate user has no recourse to revoking the trait. In this work, we devise a technique that complements the weakness of a biometric system by Combining both biometrics and a Visual based challenge response for access control, thus Enhancing Biometric System Using Visual-Based Challenge Response, having considered human factor.

Anbieter: Dodax
Stand: 02.06.2020
Zum Angebot
Expert Oracle and Java Security
62,01 € *
ggf. zzgl. Versand

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind, all the concepts in this book are introduced as to a novice and addressed as to an expert.Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

Anbieter: Dodax
Stand: 02.06.2020
Zum Angebot
Identity and Access Management - Simple Steps t...
66,90 CHF *
ggf. zzgl. Versand

The one-stop-source powering Identity and Access Management success, jam-packed with ready to use insights for success, loaded with all the data you need to decide how to gain and move ahead. An one-of-a-kind book, based on extensive research, this reveals the best practices of the most successful Identity and Access Management knowledge mavens, those who are adept at continually innovating and seeing opportunity where others do not. This is the first place to go for Identity and Access Management innovation, in today's knowledge-driven business environment, professionals face particular challenges as their purpose is to discover or develop new concepts, products, or processes; the pressure to perform is intense. This title is the entryway to a single source for innovation. BONUS: Included with the book come numerous real-world Identity and Access Management blueprints, presentations and templates ready for you to download and use. This book addresses the crucial issue of Identity and Access Management adoption by presenting the facts to move beyond general observation. The model underpinning this book has been used as a predictive decision tool, tracking thousands of innovations for over more than a decade. And...this all-encompassing analysis focuses on key areas of future Identity and Access Management growth.

Anbieter: Orell Fuessli CH
Stand: 02.06.2020
Zum Angebot
Manifestoes
46,90 CHF *
ggf. zzgl. Versand

Lyon demonstrates that the manifesto, usually perceived as the very model of rhetorical transparency, is in fact a complex, ideologically inflected genre -- one that has helped to shape modern consciousness. Lyon explores the development of the genre during periods of profound historical crisis. The French Revolution generated broadsides that became templates for the texts of Chartism, the Commune, and late nineteenth-century anarchism, while in the twentieth century the historical avantgarde embraced a revolutionary discourse that sought in the manifesto's polarizing polemics a means for disaggregating and publicizing radical artistic movements. More recently, in the manifestoes of the 1960s, the wretched of the earth called for either the full realization or the final rejection of the idea of the universal subject, paving the way for contemporary contestations of identity among second- and third-wave feminists and queer activists.

Anbieter: Orell Fuessli CH
Stand: 02.06.2020
Zum Angebot