Identity and Access Management Best Selling Books

2016 IAM Identity and Access Management Buyer's GuideSolutions Review has compiled a cross-section of the best selling books on the subject of Identity and Access Management (IAM). Below you will find a library of books from recognized experts in the field of information security covering topics ranging from IAM and Digital Identity Management to Identity Federation and Information Security and Monitoring.

Identity & Access Management: Business Performance Through Connected Intelligence

“Provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. Includes a proven step-by-step method for deploying IAM.”
Learn more

Identity and Access Management – Simple Steps to Win, Insights and Opportunities

“Packed with ready to use insights for success, based on extensive research, this book reveals the best practices of the most successful Identity and Access Management knowledge mavens, those who are adept at continually innovating .”
Learn More

Identity Management: A Primer (1st Edition)

“Providing strategies in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards.”
Learn More

CISSP Certified Information Systems Security Professional Study Guide

“Covers 100% of exam 2015 CISSP (ISC)2 candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more.”
Learn More

Focus on IAM: CSFs, Metrics, Checklists, and Guidelines

“This book is not focused on any specific IAM tool/ product; it will provide the deep delving information on Identity and Access Management with respect to process, technology, best practices, checklists, etc.”
Learn More

Identity & Access Management: A Systems Engineering Approach

“This book is specifically designed to be accessible to the general IT practitioner. It is with this goal in mind that it teases out the concepts in a way that anyone with some college education will be able to understand.”
Learn More

Identity Management: Concepts, Technologies, and Systems

“This practical resource offers an in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management.”
Learn More

Management of Information Security (3rd Edition)

“Focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. With coverage on the foundational and technical components of information security.”
Learn More

Digital Identity & Access Management: Technologies and Frameworks

“This book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes.”
Learn More

Digital Identity: Unmasking Identity Management Architecture

“This book details an important concept known as “identity management architecture” (IMA): a method to provide ample protection while giving good guys access to vital information and systems.
Learn More

Digital Identity Management (1st Edition)

“This book describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions.”
Learn More

Blue Team Handbook: Incident Response Edition

“The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The book is peppered with practical real life techniques from the authors extensive career working in academia and a corporate setting.”
Learn More