Skip to main content

Introduction

  • Chapter
  • First Online:
Securing the Perimeter

Abstract

The goal of this book is to demystify Identity and Access Management (IAM). There are thousands of professionals around the world helping companies with IAM, but that’s not enough. In this book we aim to increase the supply of IAM engineers by sharing some of the techniques and strategies developed over the last 20 years in a wide range of industries. Whether you are starting a small organization or deploying an IAM solution for a huge enterprise, the techniques presented in this book should help you deploy a solution based on Free Open Source Software (FOSS) to meet your needs. Nothing in this book is hard, and if you put the time into it, you can be an IAM professional too!

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Steven J. Vaughan-Nichols, “Coverity finds open source software quality better than proprietary code,” ZDNet, April 16, 2014, https://www.zdnet.com/article/coverity-finds-open-source-software-quality-better-than-proprietary-code/ .

  2. 2.

    Netcraft, “July 2018 Web Server Survey,” July 19, 2018, Netcraft, https://news.netcraft.com/archives/2018/07/19/july-2018-web-server-survey.html .

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Michael Schwartz, Maciej Machulak

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Schwartz, M., Machulak, M. (2018). Introduction. In: Securing the Perimeter. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2601-8_1

Download citation

Publish with us

Policies and ethics