Logo

A Guide to Claims-Based Identity and Access Control

Large book cover: A Guide to Claims-Based Identity and Access Control

A Guide to Claims-Based Identity and Access Control
by

Publisher: Microsoft Press
ISBN/ASIN: 0735640599
ISBN-13: 9780735640597
Number of pages: 148

Description:
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.

Home page url

Download or read it online for free here:
Download link
(1.8MB, PDF)

Similar books

Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(8744 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(14580 views)
Book cover: Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(13659 views)
Book cover: Snort CookbookSnort Cookbook
by - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(8149 views)