Cloud identity patterns and strategies for enterprise
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big yo...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2023
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092807631 | ||
003 | DE-627-1 | ||
005 | 20240228121954.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230530s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781805121527 |c electronic audio bk. |9 978-1-80512-152-7 | ||
020 | |a 1805121529 |c electronic audio bk. |9 1-80512-152-9 | ||
035 | |a (DE-627-1)092807631 | ||
035 | |a (DE-599)KEP092807631 | ||
035 | |a (ORHE)9781805121527 | ||
035 | |a (DE-627-1)092807631 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230502 | |
100 | 1 | |a Di Federico, Giuseppe |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cloud identity patterns and strategies for enterprise |c Giuseppe Di Federico, Fabrizio Barcaroli |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2023 | |
300 | |a 1 online resource (1 audio file (7 hr., 41 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed May 2, 2023) | ||
520 | |a Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. | ||
630 | 2 | 0 | |a OAuth |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computers |x Access control | |
650 | 4 | |a Ordinateurs ; Accès ; Contrôle | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computers ; Access control | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Barcaroli, Fabrizio |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781805121527/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092807631 |
---|---|
_version_ | 1818767380638072832 |
adam_text | |
any_adam_object | |
author | Di Federico, Giuseppe Barcaroli, Fabrizio |
author_facet | Di Federico, Giuseppe Barcaroli, Fabrizio |
author_role | aut aut |
author_sort | Di Federico, Giuseppe |
author_variant | f g d fg fgd f b fb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092807631 (DE-599)KEP092807631 (ORHE)9781805121527 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03911cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-092807631</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121954.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781805121527</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-80512-152-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1805121529</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-80512-152-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092807631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781805121527</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230502</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Di Federico, Giuseppe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud identity patterns and strategies for enterprise</subfield><subfield code="c">Giuseppe Di Federico, Fabrizio Barcaroli</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file (7 hr., 41 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed May 2, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">OAuth</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barcaroli, Fabrizio</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781805121527/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092807631 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:58Z |
institution | BVB |
isbn | 9781805121527 1805121529 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 audio file (7 hr., 41 min.)) |
psigel | ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Di Federico, Giuseppe VerfasserIn aut Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli [First edition]. [Place of publication not identified] Packt Publishing 2023 1 online resource (1 audio file (7 hr., 41 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed May 2, 2023) Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. OAuth Business enterprises Computer networks Security measures Computers Access control Ordinateurs ; Accès ; Contrôle Business enterprises ; Computer networks ; Security measures Computers ; Access control Audiobooks Livres audio Barcaroli, Fabrizio VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781805121527/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Di Federico, Giuseppe Barcaroli, Fabrizio Cloud identity patterns and strategies for enterprise OAuth Business enterprises Computer networks Security measures Computers Access control Ordinateurs ; Accès ; Contrôle Business enterprises ; Computer networks ; Security measures Computers ; Access control Audiobooks Livres audio |
title | Cloud identity patterns and strategies for enterprise |
title_auth | Cloud identity patterns and strategies for enterprise |
title_exact_search | Cloud identity patterns and strategies for enterprise |
title_full | Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli |
title_fullStr | Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli |
title_full_unstemmed | Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli |
title_short | Cloud identity patterns and strategies for enterprise |
title_sort | cloud identity patterns and strategies for enterprise |
topic | OAuth Business enterprises Computer networks Security measures Computers Access control Ordinateurs ; Accès ; Contrôle Business enterprises ; Computer networks ; Security measures Computers ; Access control Audiobooks Livres audio |
topic_facet | OAuth Business enterprises Computer networks Security measures Computers Access control Ordinateurs ; Accès ; Contrôle Business enterprises ; Computer networks ; Security measures Computers ; Access control Audiobooks Livres audio |
url | https://learning.oreilly.com/library/view/-/9781805121527/?ar |
work_keys_str_mv | AT difedericogiuseppe cloudidentitypatternsandstrategiesforenterprise AT barcarolifabrizio cloudidentitypatternsandstrategiesforenterprise |