Digital Identity
, by Windley, Phillip J.- ISBN: 9780596008789 | 0596008783
- Cover: Paperback
- Copyright: 8/30/2005
Phillip J. Windley is an Associate Professor of Computer Science at Brigham Young University. Dr. Windley is a nationally recognized expert in using information technology (IT) to add value to the business. Windley received his PhD in Computer Science from the University of California, Davis in 1990. Prior to his graduate studies, Windley worked for 4 years as a nuclear metallurgist and a member of the technical staff at the Department of Energy's Division of Naval Reactors.
Foreword | |
Preface | |
Introduction | |
Business Opportunity | |
Digital Identity | |
Matters Using Digital Identity | |
The Business Context of Identity | |
Foundational Technologies for Digital Identity | |
Identity Management Architectures | |
Defining Digital Identity | |
The Language of Digital Identity | |
Identity Scenarios in the Physical World | |
Identity, Security, and Privacy Digital Identity | |
Perspectives Identity | |
Powershifts | |
Conclusion | |
Trust | |
What Is Trust? | |
Trust and Evidence | |
Trust and Risk | |
Reputation and Trust Communities | |
Conclusion | |
Privacy and Identity | |
Who's Afraid of RFID? | |
Privacy Pragmatism | |
Privacy Drivers | |
Privacy Audits | |
Privacy Policy | |
Capitalism | |
Anonymity and Pseudonymity | |
Privacy Principles Prerequisites | |
Conclusion | |
The Digital Identity | |
Lifecycle Provisioning Propagating | |
Using Maintaining Deprovisioning | |
Conclusion | |
Integrity, Non-Repudiation, and Confidentiality | |
Integrity Non-Repudiation Confidentiality | |
Conclusion | |
Authentication | |
Authentication and Trust | |
Authentication Systems | |
Authentication System Properties | |
Conclusion | |
Access Control Policy | |
First Authorization Patterns | |
Abstract | |
Authorization Architectures | |
Digital Certificates and Access Control | |
Conclusion | |
Names and Directories | |
Utah.gov: Naming and Directories | |
Naming Directories Aggregating | |
Directory Information | |
Conclusion | |
Digital Rights | |
Management Digital Leakage | |
The DRM Battle Apple iTunes: A Case Study in DRM | |
Features of DRM | |
DRM Reference | |
Architecture Trusted | |
Computing Platforms | |
Specifying Rights | |
Conclusion | |
Interoperability Standards | |
Standards and the Digital Identity | |
Lifecycle Integrity and Non-Repudiation: XML Signature | |
Confidentiality: XML Encryption | |
Authentication and Authorization Assertions Example SAML | |
Use Cases Identity | |
Provisioning Representing and Managing Authorization Policies | |
Conclusion | |
Federating Identity | |
Centralized Versus Federated Identity | |
The Mirage of Centralized Efficiency | |
Network Effects and Digital Identity | |
Management Federation in the Credit Card Industry | |
Benefits of Federated Identity | |
Digital Identity Standards | |
Three Federation Patterns | |
Conclusion | |
An Architecture for Digital Identity | |
Identity Management Architecture | |
The Benefits of an Identity Management Architecture | |
Success Factors | |
Roadblocks Identity Management | |
Architecture Components | |
Conclusion | |
Governance and Business Modeling | |
IMA Lifecycle | |
IMA Governance Model | |
Initial Steps Creating a Vision | |
IMA Governing Roles | |
Resources | |
What to Outsource Understanding the Business | |
Context Business | |
Function Matrix | |
IMA Principles | |
Conclusion | |
Identity Maturity Models and Process | |
Architectures | |
Maturity Levels | |
The Maturity Model | |
The Rights Steps at the Right Time | |
Finding Identity Processes | |
Evaluating Processes | |
A Practical Action Plan | |
Filling the Gaps with Best Practices | |
Conclusion | |
Identity Data Architectures | |
Build a Data Architecture Processes | |
Link Identities | |
Data Categorization Identity | |
Data Structure and Metadata Exchanging Identity | |
Data Principles for Identity Data | |
Conclusion | |
Interoperability Frameworks for Identity | |
Principles of a Good IF | |
Contents of an Identity IF | |
Example Interoperability Framework | |
A Word of Warning | |
Conclusion | |
Identity Policies | |
The Policy Stack | |
Attributes of a Good Identity Policy | |
Determining Policy Needs | |
Writing Identity Policies | |
An Identity Policy Suite | |
Assessing Identity Policies | |
Enforcement Procedures | |
Conclusion | |
Identity Management | |
Reference Architectures | |
Reference Architectures | |
Benefits and Pitfalls | |
Reference Architecture | |
Best Practices | |
Using a Reference Architecture | |
Components of a Reference Architecture | |
Technical Position Statements | |
Consolidated Infrastructure Blueprint | |
System Reference Architectures | |
Conclusion | |
Building an Identity Management | |
Architecture Scoping the Process | |
Which Projects Are Enterprise Projects? | |
Sequencing the IMA Effort | |
A Piece at a Time | |
Conclusion: Dispelling IMA Myths | |
Index | |
Foreword | |
Credits | |
Preface | |
Halo 2 Jumping | |
Add Height to All Your Jumps | |
Blast Yourself into the Air | |
Extend Your Jumping Distance | |
The Longest Unaided Halo 2 Jump | |
Extend Your Landing Points | |
Halo 2 Skulls | |
Find Your First Skull | |
Fight the Elite of the Elites | |
Eliminate the HUD | |
Find the Most Difficult Skull | |
Receive the Gift of Grenades | |
Throw a Grunt Birthday Party | |
Activate the Ammunition Handicap | |
Camouflage the Master Chief | |
Give All Enemies Active Camouflage | |
Make All Enemies Tougher | |
Change the Laws of Physics | |
Make the Grunts a Little Tougher | |
Teach Your Enemies to Take a Punch | |
Make Co-op Harder | |
Add a Twist to Your Shields | |
Halo 2 Easter Eggs | |
See the Grunts Dance with Macho Man | |
Locate Secret Messages in Multiplayer Maps | |
Uncover the Hidden Art Galleries | |
Read the Master Chief Poster | |
Customize the Zanzibar Signage | |
Kick Around a Soccer Ball | |
Collect the Hidden Sword on Outskirts | |
Hidden Swords on Delta Halo | |
Super Weapon on Metropolis | |
Gameplay Tricks | |
Change Split Screen View | |
Revert to Multiple Checkpoints | |
Get Out of Outskirts | |
Get Above Delta Halo | |
Get Out of Burial Mounds | |
Jump Out of Foundation | |
Get on Top of Lockout | |
Get on Top of Zanzibar | |
Warthog Trampoline | |
The Easy Way to the Beaver Creek Launcher | |
Halo 2 Glitches | |
Fly Like a Bird | |
Create a Giant Phantom MC | |
Give Yourself Infinite Camouflage | |
Overload the Game Engine | |
Find the Mysterious Super Jump | |
Get Unlimited Sword Energy | |
Drop Your Weapons | |
Teach a Scorpion to Fly | |
Create a Ring of Rockets | |
Slow Down Rockets | |
Hacking Setup and Software | |
Mod Your Maps with ADI | |
Use an Open Source Map Editor | |
Mod Maps with DotHalo | |
Sign Your Custom Maps | |
Hack Halo 2 by Hand | |
Share Your Saved Games | |
Remix Multiplayer Levels with Campaign Mode Objects | |
Weapon Mods | |
Become a Grenade Sniper | |
Change Your Clip Size | |
Push Your Friends Around | |
Swap Ammunition | |
Dual Wield Any Weapon | |
Death by Soccer Balls | |
Add 10x Zoom to Any Weapon | |
Lunge for the Sky | |
Clear the Zoom | |
Silence the Zoom | |
Change Grenade Explosions | |
Vehicle Mods | |
Exchange the Weapons on Your Vehicle | |
Fly with Ground-Locked Vehicles | |
Trick Out Your Ride | |
Pimp Out Your Ride with Tunes | |
Level Mods | |
Alter the Textures in a Level | |
Adjust the Halo 2 Lighting | |
Give Your Map Its Own Menu Image | |
Alter the Size of Objects in Your Maps | |
Turn Grenades into Skulls | |
Display Mods | |
Film High-Quality Videos and Machinima | |
Manually Remove Low-Level Textures | |
Improve Your View of the Battlefield | |
Customize the Halo 2 Splash Screen | |
Customize the Halo 2 Demo Videos | |
Gameplay Mods | |
Speed Walking | |
Crouch to the Sky | |
Jump for the Sky | |
Remove Sound | |
Change Halo 2's Machinery | |
Sit in the Bleachers | |
Give Yourself Super Powers | |
Create a Custom Game Variant | |
Halo 2 Remixed | |
Spend Some Time with the Zombies | |
Fight Your Way Through Much Squalor | |
Visit the Moon | |
Spend a Night in a Haunted Creek | |
Take a Walk in a Winter Wonderland | |
Blast It All to Bits | |
Crawl Around a Desert | |
See the Forest for the Trees | |
Break Out Some Wild Weaponry | |
Thrill to the Sights and Sounds of Zentation | |
Create Your Own Level Mods | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.