Abstract
The goal of this book is to demystify Identity and Access Management (IAM). There are thousands of professionals around the world helping companies with IAM, but that’s not enough. In this book we aim to increase the supply of IAM engineers by sharing some of the techniques and strategies developed over the last 20 years in a wide range of industries. Whether you are starting a small organization or deploying an IAM solution for a huge enterprise, the techniques presented in this book should help you deploy a solution based on Free Open Source Software (FOSS) to meet your needs. Nothing in this book is hard, and if you put the time into it, you can be an IAM professional too!
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Steven J. Vaughan-Nichols, “Coverity finds open source software quality better than proprietary code,” ZDNet, April 16, 2014, https://www.zdnet.com/article/coverity-finds-open-source-software-quality-better-than-proprietary-code/ .
- 2.
Netcraft, “July 2018 Web Server Survey,” July 19, 2018, Netcraft, https://news.netcraft.com/archives/2018/07/19/july-2018-web-server-survey.html .
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Michael Schwartz, Maciej Machulak
About this chapter
Cite this chapter
Schwartz, M., Machulak, M. (2018). Introduction. In: Securing the Perimeter. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2601-8_1
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2601-8_1
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2600-1
Online ISBN: 978-1-4842-2601-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books