Top Ten Books for Identity Management Professionals

Top Ten Books for Identity Management Professionals

Solutions Review compiles the 10 essential books that identity management professionals need to add to their reading lists.

Identity Management now comprises the new digital perimeter for businesses. The majority of cyber attacks begin with compromised credentials, privileged or otherwise. We’ve listed the top 10 books that identity management professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the fields of identity management and cybersecurity.

Be sure to also consult our Identity Management Buyer’s Guide for information on the top identity and access management solution providers. It’s the perfect resource if you don’t want your organization to suffer from credentials compromise and insider threats.

Note: Titles are listed in no particular order.

Top Ten Books for Identity Management Professionals

Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud

By Sander Berkouwer

Top Ten Books for Identity Management ProfessionalsThis book starts off with comprehensive insights into forests, domains, trusts, schemas, and partitions. Next, you’ll learn how to manage domain controllers, organizational units and default containers. You’ll then get up to speed with monitoring Active Directory sites as well as identifying and solving replication problems. Later chapters will cover the different components of Active Directory and demonstrate how to manage users, groups, and computers.”

Available here. 

Personal Information Security & Systems Architecture: Techniques for PII Management in a Business

By Sander Berkouwer

Generic cyber-attacks in APAC alone has cost an estimated $1.7 trillion in 2017 (Yu, 2018). The amount stolen is staggering; it’s a multi-billion dollar “underground business” affecting everyone.Governments, given such breaches and rampant wholesale data collection, are quickly creating robust legislation. Businesses, when faced with having to meet such evolving regulatory requirements, find it hard working out what to do; this is where this book excels. It explains what to focus on, when and why. Detailed are security, architectural and technical best practices based on real-world experience, combined with a PII focus.

Available here.

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

By Yvonne Wilson and Abhishek Hingnikar 

Top Ten Books for Identity Management ProfessionalsAt a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Available here.

Identity Management: A Primer

By Graham Williamson, Ilan Sharoni, David Yip, and Kent Spaulding 

“In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.”

Available here.

Identity Management: A Business Perspective

By Graham Williamson

Top Ten Books for Identity Management Professionals“This book will help managers and CIOs understand: • Automating identity provisioning into your access control systems • How to evaluate the maturity of your identity management environment • The difference between authentication and authorization • Why federated authentication is so important and how to get it right • How roles and attributes are used to determine access control • The level of digital transformation that’s coming in the management of consumer identities.”

Available here. 

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

By Michael Schwartz and Maciej Machulak 

Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.”

Available here. 

Identity And Access Management A Complete Guide – 2020 Edition

By Gerardus Blokdyk 

Top Ten Books for Identity Management ProfessionalsHow do I reduce the effort in the Identity And Access Management work to be done to get problems solved? How can I ensure that plans of action include every Identity And Access Management task and that every Identity And Access Management outcome is in place?… Blokdyk ensures all Identity And Access Management essentials are covered, from every angle.

Available here. 

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

By Morey J. Haber and Darran Rolls

As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security.  Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident.

Available here. 

Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication

By Lisa Bock

Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication…The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.

Available here. 

Access 2019 Bible

By Michael Alexander and Richard Kusleika

Top Ten Books for Identity Management Professionals“Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application.” 

Available here. 

Thanks for checking out our list of top ten books for identity management professionals. Be sure to also check out our Identity Management Buyer’s Guide

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner