Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
Solutions Review finds the best books for identity management available on Amazon right now. You must add them to your collection today.
Security companies can use many valuable resources to improve and maintain the skills and expertise of their employees. However, if you’re looking for something to help a newcomer get started, or if you want something for your team to do together, there are few options better than a good book. To help you find the right title to use as an educational resource, our editors researched some of the best identity management books on Amazon and highlighted some below.
These books are intended for beginners and experts alike and are written by competent and / or recognized authors in the field of cybersecurity.
The Best Books for Identity Management Available Now
Book Title: Identity management: a business perspective
Our opinion : Graham Williamson has 27 years of experience in the IT industry, with expertise in identity management. This text is a clear business resource.
The description: For business leaders and CIOs, managing the identity data of employees, contractors, business partners and customers has become an important core capability. This practical guide discusses the impacts of identity management on organizations from a businessperson’s perspective. This book will help managers and CIOs understand: • Automating Identity Provisioning in Your Access Control Systems • How to Assess the Maturity of Your Identity Management Environment • The Difference Between Authentication and Authorization • Why federated authentication is so important and how to do it right.
Go to this book
Book Title: Consumer Identity and Access Management: Design Basics
Our opinion : Simon Moffatt is a recognized expert in the field of identity and digital access management, having worked for almost 20 years in the sector. It shows in the book.
The description: Modern organizations must not only meet the privacy, security and usability requirements of end users, but also provide business activation opportunities that are agile and can respond quickly to market changes. The modern enterprise architect and the CISO are no longer just focusing on internal employee security – they must now respond to the growing need for digital empowerment of consumers and citizens alike. A CISO and Architect perspective on designing the fundamental building blocks of a scalable, secure, and usable Consumer Identity and Access Management (CIAM) system. Covering: Business Goals, Drivers, Requirements, CIAM Lifecycle, Standards Implementation Toolkit, Design Principles, and Supplier Selection Tips.
Go to this book
Book Title: Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
Our opinion : Yvonne Wilson and Abhishek Hingnikar both have extensive experience in software development and identity management. Their expertise is evident throughout the text.
The description: This book takes you from account provisioning to authentication and authorization, and covers troubleshooting and common issues to avoid. The authors include predictions of why this will be even more important in the future. Application best practices with coding examples are provided. Solve Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, etc.
Go to this book
Book Title: Digital Identity: Unmasking Identity Management Architecture (IMA)
Our opinion : Phillip J. Windley is Associate Professor of Computer Science at Brigham Young University.
The description: Some companies are starting to rethink the way they provide security, so that interactions with customers, employees, partners and suppliers are richer and more flexible. Digital identity explains how to go about it. This book details an important concept known as “Identity Management Architecture” (IMA): a method to provide sufficient protection while giving the right users access to vital information and systems. In today’s service-driven economy, digital identity is paramount. IMA is a cohesive set of enterprise-wide standards, policies, certifications, and management activities that enable companies like yours to effectively manage digital identity, not just as a security check, but as a means of expanding services and identifying customer needs.
Go to this book
Book Title: Development of the InfoSec manual: master plan for security monitoring and incident response
Our opinion : The authors of this particular text come from the information security investigation community, with exactly the experience that your SOC can benefit from.
The description: Any good attacker will tell you that expensive security monitoring and prevention tools are not enough to keep you safe. This hands-on book introduces a data-centric approach to distilling complex ideas of security monitoring, incident response, and threat analysis into their most basic elements. You will learn how to develop your own threat intelligence and incident detection strategy, rather than relying solely on security tools. Written by members of the Cisco IT Security Incident Response team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. .
Go to Book
Book Title: Identity management with biometrics: explore the latest innovative solutions to provide secure identification and authentication
Our opinion : Lisa Bock is a senior author with a proven track record of working in the online learning industry, particularly in Identity Management. She is an authority on authentication.
The description: Starting with an overview of biometrics, you will learn about the different uses and applications of biometrics in fintech, buildings, border control and many other fields. You will understand the characteristics of an optimal biometric system, then go through different types of errors and learn about the benefits of multi-factor authentication. You will also learn about the usability and accuracy analysis of a biometric system and understand the process of implementation, testing and deployment, while addressing privacy concerns. The book highlights the importance of protecting biometric data using encryption and shows you the factors to consider and how to analyze them before investing in biometric technologies.
Go to this book
Book Title: Access control and identity management (security and assurance of information systems)
Our opinion : Mike Chapple is Senior Director of IT Services Delivery at the University of Notre Dame. This is an in-depth text for cybersecurity students.
Description: Reviewed and updated with the latest data from this rapidly evolving field, Access Control and Identity Management define the components of access control, provide a business framework for implementation, and discuss requirements legal regulations that have an impact on access control programs. Focused on identity and security management, this new edition examines the risks, threats and vulnerabilities prevalent in information systems and IT infrastructures and how to manage them. This valuable resource provides students and professionals with details and procedures on implementing access control systems as well as managing and testing these systems.
Go to this book