NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Highlights

The AI used to provide these results are constantly improving. These results might change.

Quality


The standards include all protocols and applications from ssl xml ldap dns and much more


This book is designed to familiarize cios it managers and other it professionals with the language concepts and technology of d...  Read More


Note in an email exchange with the author he indicated that although he strongly disagreed with what was in that report his off...  Read More

Competitiveness


Refreshing discussion in chapter 8 on access control and principle of least privilege in the real world

Overview

  • How are reviewers describing this item?
    technical, real and many.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 80% high quality reviews are present.
  • This product had a total of 19 reviews as of our last analysis date on Jan 2 2022.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    What i got was a extremely thorough discussion of identity management architectures within the context of information systems is governance processes


    Posted by a reviewer on Amazon

    There is only one place where phillip windley former cio of the state of utah falls short in this book


    Posted by a reviewer on Amazon

    Windley also does an excellent job at showing why critics of digital rights management drm as enforced by the movie and record industries are doing more of a disservice by framing the drm dialog in the wrong context


    Posted by a reviewer on Amazon

    A such people are predisposed in their opinions whenever the discussion comes up in any context


    Posted by a reviewer on Amazon

    Stating this up front the reader of the book will walk through an explanation of what digital identity is the concept of trust the lifecycle of digital identity and the business reasons for it


    Posted by a reviewer on Amazon

    You see the reality is that if you come into an organization like a bull in the china shop you are going to make enemies


    Posted by a reviewer on Amazon

    From what he is written in this book this seems to be the style he employed when trying to unify the utah information infrastructure


    Posted by a reviewer on Amazon

    The result of this that is not covered in the book is that he was forced to resign as cio under the cloud of an investigation of improper hiring practices

Review Count History
Loading...
Price History
Loading...