This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
The DMTF’s recent work on management information modeling in the IP world has highlighted that a number of problems are still unsolved in this important area of enterprise manage...
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...