LEADER 00685nam0-22002651i-450- 001 990001074340403321 035 $a000107434 035 $aFED01000107434 035 $a(Aleph)000107434FED01 035 $a000107434 100 $a20000920d1970----km-y0itay50------ba 101 0 $aeng 200 1 $aProblemas de Fisica General 210 $a[S.l.]$cMIR$d1970 610 0 $aFisica$aOpere generali 676 $a530 700 1$aVol'kenshtein,$bMikhail V.$065214 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001074340403321 952 $a20A-096$b11043$fFI1 959 $aFI1 996 $aProblemas de Fisica General$9336346 997 $aUNINA DB $aING01 LEADER 01039nam--2200337---450- 001 990002321130203316 005 20090526125049.0 035 $a000232113 035 $aUSA01000232113 035 $a(ALEPH)000232113USA01 035 $a000232113 100 $a20041230d1976----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aDelle cinque piaghe della Santa Chiesa$etrattato dedicato al Clero Cattolico$econ aggiunte e chiarificazioni inedite$fAntonio Rosmini 210 $aBrescia$cMorcelliana$d1976 215 $a440 p.$d21 cm 410 0$12001 454 1$12001 461 1$1001-------$12001 700 1$aROSMINI SERBATI,$bAntonio$0303763 801 0$aIT$bsalbc$gISBD 912 $a990002321130203316 951 $aII.2. 5146 (ISP III 234)$b48301 E.C.$cISP III$d00016580 959 $aBK 969 $aGIU 979 $aSIAV7$b10$c20041230$lUSA01$h1442 979 $aRSIAV4$b90$c20090526$lUSA01$h1250 996 $aDelle cinque piaghe della Santa Chiesa$9203925 997 $aUNISA LEADER 03031nam 2200625 450 001 9910785597803321 005 20221206095503.0 010 $a1-60807-040-9 035 $a(CKB)2670000000066084 035 $a(EBL)634511 035 $a(OCoLC)699475215 035 $a(SSID)ssj0000470173 035 $a(PQKBManifestationID)11321140 035 $a(PQKBTitleCode)TC0000470173 035 $a(PQKBWorkID)10410636 035 $a(PQKB)11764535 035 $a(Au-PeEL)EBL634511 035 $a(CaPaEBR)ebr10440688 035 $a(CaBNVSL)mat09100140 035 $a(IEEE)9100140 035 $a(MiAaPQ)EBC634511 035 $a(EXLCZ)992670000000066084 100 $a20200729d2010 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIdentity Management $econcepts, technologies, and systems /$fElisa Bertino, Kenji Takahashi 210 1$aBoston, Massachusetts ;$cArtech House,$d2010. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2010] 215 $a1 online resource (198 p.) 225 1 $aInformation security and privacy series 300 $aDescription based upon print version of record. 311 $a1-60807-039-5 320 $aIncludes bibliographical references and index. 327 $a1. Introduction -- 2. What Is Identity Management? -- 2.1 Stakeholders and Their Requirements -- 2.2 Identity Life Cycle -- 2.3 Identity Assurance -- References -- 3. Fundamental Technologies andProcesses -- 330 $a"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL. 410 0$aArtech House information security and privacy series. 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aBusiness enterprises$xComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 676 $a005.8 700 $aBertino$b Elisa$0754415 701 $aTakahashi$b Kenji$01476141 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910785597803321 996 $aIdentity Management$93690552 997 $aUNINA