Logo

A Guide to Claims-Based Identity and Access Control

Large book cover: A Guide to Claims-Based Identity and Access Control

A Guide to Claims-Based Identity and Access Control
by

Publisher: Microsoft Press
ISBN/ASIN: 0735640599
ISBN-13: 9780735640597
Number of pages: 148

Description:
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.

Home page url

Download or read it online for free here:
Download link
(1.8MB, PDF)

Similar books

Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(10469 views)
Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(11635 views)
Book cover: Network Security and ManagementNetwork Security and Management
- Wikipedia
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
(4103 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(11126 views)