Universal Book Ratings
#1,650,168 in Books (See Top 100 in Books)
#12,378 in Web Administration
#27,811 in Computer Science (Books)
#1,650,168 in Reference (Books)
Computing & Internet      Networking & Security

Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience

(0 reviews)
Paper Back
£47.58
£44.34
Condition
Quantity
(689 available)
Share
Book Details
Language
English
Publishers
Packt Publishing (19 July 2024)
Weight
0.67 KG
Publication Date
19/07/2024
ISBN-10
1804617636
Pages
392 pages
ISBN-13
9781804617632
Dimensions
2.74 x 19.05 x 23.5 cm
SKU
9781804617632
Author Name
Rohan Pinto (Author)
A “cryptography geek,” Rohan has been the go-to security and identity management maven for over three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.As a senior Identity and Access Management Architect Rohan Pinto specialized in architecting, implementing and deploying large-scale Identity Management, Authentication and Authorization (RBAC,ABAC, RiskBAC,TrustBAC) infrastructures with specific emphasis in Security. Rohan was lead architect on a team that developed security infrastructure for the Government of Ontario and the Health Information Access Layer (HIAL) for the Province of British Columbia, and is involved in establishing the United States Department of Defense’s Security Access Layer using Common Access Cards (CAC). Always willing to share his vast knowledge and experience, Rohan mentors emerging business and tech talents through organizations such as Techstars and Founder Institute. He is also an active member of several business, tech, and identity management associations, including the Forbes Technology Council, the Decentralized Identity Foundation, and the FIDO (Fast Identity Online) Alliance.Rohan Pinto is a strong technologist with both the strategic vision and tactical intelligence to lead technology-based growth initiatives grounded solidly on business value.Extensive experience and knowledge in all phases of project life cycle management using agile process methodologies with an emphasis on practical application to improve security and compliance.Strong technical leadership in large project environments.Deep expertise in large-scale distributed system architectures that utilize Open Standards, Web Services, Java, and Open Source Technologies.Specialties: Identity Management - Sun IdM, Vitria, Apere IDM, ICRareFederation and Access Management - Sun Access Manager, OpenSSO, Siteminder, Oblix, IBM Tivoli AM, CardSpaceRisk and Compliance - Sun Role ManagerEnterprise Java (J2EE/EE) and Web services (SOAP, WS Security)Web Development - PHP, Python, Java, RoRMethodology and GovernanceProject Management and LeadershipOpen source and Open standard technologiesAJAX (jQuery/YUI), OSGI,C/C++,ESB,SCA,HL7, TIBCORead more about this authorRead less about this author
Read More

Reviews & Ratings

5 out of 5.0
(0 reviews)
There have been no reviews for this product yet.
Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management technologies and leverage them to craft seamless digital experiences for both your customers and employees Key FeaturesExplore decentralized identities and blockchain technology in depthGain practical insights for leveraging advanced digital identity management tools, frameworks, and solutionsDiscover best practices for integrating decentralized identity solutions into existing systemsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionLooking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today's cybersecurity landscape. Decentralized Identity Explained delves into the evolution of digital identities, from their historical roots to the present landscape and future trajectories, exploring crucial concepts such as IAM, the significance of trust anchors and sources of truth, and emerging trends such as SSI and DIDs.

Additionally, you’ll gain insights into the intricate relationships between trust and risk, the importance of informed consent, and the evolving role of biometrics in enhancing security within distributed identity management systems. Through detailed discussions on protocols, standards, and authentication mechanisms, this book equips you with the knowledge and tools needed to navigate the complexities of digital identity management in both current and future cybersecurity landscapes.

By the end of this book, you’ll have a detailed understanding of digital identity management and best practices to implement secure and efficient digital identity frameworks, enhancing both organizational security and user experiences in the digital realm. What you will learnUnderstand the need for security, privacy, and user-centric methodsGet up to speed with the IAM security frameworkExplore the crucial role of sources of truth in identity data verificationDiscover best practices for implementing access control listsGain insights into the fundamentals of informed consentDelve into SSI and understand why it mattersExplore identity verification methods such as knowledge-based and biometricWho this book is forThis book is for cybersecurity professionals and IAM engineers/architects who want to learn how decentralized identity helps to improve security and privacy and how to leverage it as a trust framework for identity management.

Table of ContentsThe History of Digital IdentityIdentity Management Versus Access ManagementIAM Best PracticesTrust Anchors/Sources of Truth and Their ImportanceHistorical Source of AuthorityRelationships between Trust and RiskInformed Consent and Why It MattersIAM – the Security PerspectiveSelf-Sovereign IdentityPrivacy by Design in the SSI SpaceRelationship between DIDs and SSIProtocols and Standards – DID StandardsDID AuthenticationIdentity VerificationBiometrics Security in Distributed Identity Management. .

Frequently Bought Products

Product Queries (0)

Login Or Registerto submit your questions to seller

Other Questions

No none asked to seller yet

Bookiyos Books Solutions - Quality Books, Unbeatable Prices

Bookiyos Books Solutions is your premier online bookstore offering a vast selection of over 5 crore books. Whether you're looking for the latest releases, timeless classics, or rare finds, we have something for every reader. Our platform serves customers worldwide, including the USA, UK, and Europe, with fast delivery and easy return policies to ensure a hassle-free shopping experience. Discover daily updates, exclusive deals, and a comprehensive collection of books that cater to all your reading needs. Shop with confidence at Bookiyos, where quality books and unbeatable prices meet.

Why Choose Bookiyos?

Extensive Inventory: New, old, and rare books available.
Fast Delivery: Same or next-day shipping.
Easy Returns: Hassle-free refund and return policies.
Global Reach: Serving customers in the USA, UK, Europe, and beyond.
Daily Updates: Thousands of new titles added every day.
Join our community of book lovers and start your literary journey with Bookiyos Books Solutions today!