Solutions Review finds the Highest-Rated Identity Management Books available on Amazon right now. You need to add these to your collection today.
Solutions Review frequently shares our finds for essential cybersecurity titles and books every InfoSec professional and IT security team should have on the shelf. Here’s one of our lists.
For this list, we wanted to zoom in on a specific branch of cybersecurity – Identity Management – and share the highest-rated titles on the subject. These books qualify for this list by being about identity management or access management specifically and having a four-star rating on Amazon at minimum.
These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the field of cybersecurity.
The Highest-Rated Identity Management Books Available on Amazon
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
Our Take: Yvonne Wilson and Abhishek Hingnikar both have extensive experience in software development and identity management. Their expertise is evident throughout the text.
Description: This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.
Our Take: All of the authors have experience in identity management, software development, and cybersecurity. With their extensive knowledge of the field, this is a critical read.
Description: In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.
Our Take: Mike Chapple is Senior Director for IT Service Delivery at the University of Notre Dame. This is an in-depth text for cybersecurity students.
Description: Revised and updated with the latest data from this fast-paced field, Access Control and Identity Management defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. Focusing on Identity and Security Management, this new edition looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. This valuable resource provides both students and professionals with details and procedures on implementing access control systems as well as managing and testing those systems.
Our Take: Morey J. Haber is Chief Technology Officer at BeyondTrust and Darran Rolls is CISO and Chief Technology Officer at SailPoint. Greater experts are hard to come by.
Description: As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber-attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities.
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Our Take: Lisa Bock is an experienced author with a demonstrated history of working in the e-learning industry, especially in identity management. She’s an authority on authentication.
Description: Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You’ll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.
Our Take: Graham Williamson has 27 years of experience in the IT industry, with expertise in identity management. This text is a clear enterprise resource.
Description: For business managers and CIOs, managing identity data of employees, contractors, business partners, and customers has become an important core capability. This practical guide discusses the impacts of identity management on organizations from a businessperson’s perspective. This book will help managers and CIOs understand: • Automating identity provisioning into your access control systems • How to evaluate the maturity of your identity management environment • The difference between authentication and authorization • Why federated authentication is so important and how to get it right.
Our Take: Simon Moffatt is a recognized expert in the field of digital identity and access management, having spent nearly 20 years working in the sector. It comes through in the book.
Description: Modern organizations need to not only meet end-user privacy, security, and usability requirements but also provide business enablement opportunities that are agile and can respond to market changes rapidly. The modern enterprise architect and CISO is no longer just focused upon internal employee security – they now need to address the growing need for digital enablement across consumers and citizens too. A CISO and architect view on designing the fundamental building blocks of a scalable, secure and usable consumer identity and access management (CIAM) system. Covering: business objectives, drivers, requirements, CIAM life-cycle, implementer toolkit of standards, design principles, and vendor selection guidance.
Our Take: Phillip J. Windley is an Associate Professor of Computer Science at Brigham Young University.
Description: Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings–or system architectures–function as part of the overall plan. With Windley’s experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt’s administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
- The Best Identity Governance Tools and Vendors in 2023 - December 31, 2022
- The Best Privileged Access Management Providers for 2023 - November 1, 2022
- The 10 Best Free and Open-Source Identity Management Tools - October 15, 2022