Top Ten Books for Identity Management Professionals
Solutions Review compiles the 10 essential books that identity management professionals need to add to their reading lists.
Identity Management now comprises the new digital perimeter for businesses. The majority of cyber attacks begin with compromised credentials, privileged or otherwise. We’ve listed the top 10 books that identity management professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the fields of identity management and cybersecurity.
Be sure to also consult our Identity Management Buyer’s Guide for information on the top identity and access management solution providers. It’s the perfect resource if you don’t want your organization to suffer from credentials compromise and insider threats.
Note: Titles are listed in no particular order.
Widget not in any sidebars
Top Ten Books for Identity Management Professionals
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud
By Sander Berkouwer
“This book starts off with comprehensive insights into forests, domains, trusts, schemas, and partitions. Next, you’ll learn how to manage domain controllers, organizational units and default containers. You’ll then get up to speed with monitoring Active Directory sites as well as identifying and solving replication problems. Later chapters will cover the different components of Active Directory and demonstrate how to manage users, groups, and computers.”
Go to this book
Personal Information Security & Systems Architecture: Techniques for PII Management in a Business
By Sander Berkouwer
“Generic cyber-attacks in APAC alone has cost an estimated $1.7 trillion in 2017 (Yu, 2018). The amount stolen is staggering; it’s a multi-billion dollar “underground business” affecting everyone.Governments, given such breaches and rampant wholesale data collection, are quickly creating robust legislation. Businesses, when faced with having to meet such evolving regulatory requirements, find it hard working out what to do; this is where this book excels. It explains what to focus on, when and why. Detailed are security, architectural and technical best practices based on real-world experience, combined with a PII focus.”
Go to this book
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
By Yvonne Wilson and Abhishek Hingnikar
“At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.”
Go to this book
Identity Management: A Primer
By Graham Williamson, Ilan Sharoni, David Yip, and Kent Spaulding
“In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.”
Go to this book
Identity Management: A Business Perspective
By Graham Williamson
“This book will help managers and CIOs understand: • Automating identity provisioning into your access control systems • How to evaluate the maturity of your identity management environment • The difference between authentication and authorization • Why federated authentication is so important and how to get it right • How roles and attributes are used to determine access control • The level of digital transformation that’s coming in the management of consumer identities.”
Go to this book
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
By Michael Schwartz and Maciej Machulak
“Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.”
Go to this book
Identity And Access Management A Complete Guide – 2020 Edition
By Gerardus Blokdyk
“How do I reduce the effort in the Identity And Access Management work to be done to get problems solved? How can I ensure that plans of action include every Identity And Access Management task and that every Identity And Access Management outcome is in place?… Blokdyk ensures all Identity And Access Management essentials are covered, from every angle.”
Go to this book
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
By Morey J. Haber and Darran Rolls
“As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident.”
Go to this book
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
By Lisa Bock
“Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication…The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.”
Go to this book
Access 2019 Bible
By Michael Alexander and Richard Kusleika
“Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application.”
Go to this book
Thanks for checking out our list of top ten books for identity management professionals. Be sure to also check out our Identity Management Buyer’s Guide.
Widget not in any sidebars
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.