This book reviews the research and development activities of a number of existing identity management architectures in privately and publicly funded organizations. It provides a holistic view of identity and access management in regard to requirements technologies life cycle processes and overview of present and future commercial Identity and Access Management systems--
Piracy-free
Assured Quality
Secure Transactions
*COD & Shipping Charges may apply on certain items.