Skip to content
You are not logged in |Login  
     
Limit search to available items
Book Cover
book
BookBook
Author Windley, Phillip J., 1958- author.

Title Learning digital identity : design, deploy, and manage identity architectures / Phillip J. Windley.

Publication Info. Sebastopol, CA : O'Reilly Media, Inc., 2023.

Copies

Location Call No. Status
 New Britain, Main Library - Non Fiction  005.8 WIN    Check Shelf
Edition First edition.
Description xxi, 446 pages : illustrations ; 23 cm
Bibliography Includes bibliographical references and index.
Contents 1. The Nature of Identity -- 2. Defining Digital Identity -- 3. The Problems of Digital Identity -- 4. The Laws of Digital Identity -- 5. Relationships and Identity -- 6. The Digital Relationship Lifecyde -- 7. Trust, Confidence, and Risk -- 8. Privacy -- 9. Integrity, Nonrepudiation, and Confidentiality -- 10. Names, Identifiers, and Discovery -- 11. Authentication and Relationship Integrity -- 12. Access Control and Relationship Utility -- 13. Federated Identity --- Leveraging Strong Relationships -- 14. Cryptographic Identifiers -- 15. Verifiable Credentials -- 16. Digital Identity Architectures -- 17. Authentic Digital Relationships -- 18. Identity Wallets and Agents -- 19. Smart Identity Agents -- 20. Identity on the Internet of Things -- 21. Identity Policies -- 22. Governing Identity Ecosystems -- 23. Generative Identity
Summary Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses. -- Provided by publisher.
Subject Computer networks -- Security measures.
Data protection.
Computer crimes -- Prevention.
Computer crimes -- Prevention. (OCoLC)fst00872068
Computer networks -- Security measures. (OCoLC)fst00872341
Data protection. (OCoLC)fst00887958
ISBN 9781098117696
1098117697
-->
Add a Review