Securing the Perimeter: Deploying Identity and Access Management with Free Open
63,13 €
Financially, it's more valuable to prevent than to detect a security breach. In the past, IAM software has been available only from large enterprise software vendors. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.
Jetzt bei Ebay: