Book
- AAA Identity Management Security
- Digital Identity and Social Media
- Entity Framework Tutorial: Learn to Build a Better Data Access Layer with the ADO.NET Entity Framework and ADO.NET Data Services
- Identity and Access Management Solutions: Using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1
- Integrated Identity Management using IBM Tivoli Security Solutions
- Oracle Fusion Middleware Patterns: Real-World Composite Applications Using SOA, BPM, Enterprise 2.0, Business Intelligence, Identity Management, and Application Infrastructure
- Social Identity: Knowing Yourself, Leading Others
- Visual Identity: Promoting and Protecting the Public Face of an Organization
Data and Databases
- Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection
- Database Design Using Entity-Relationship Diagrams
- Entity Framework 6 Recipes, Second Edition
- Entity Information Life Cycle for Big Data: Master Data Management and Information Integration
- Linguistic Identity Matching
- Modern Data Access with Entity Framework Core: Database Programming Techniques for .NET, .NET Core, UWP, and Xamarin with C#
- Practical Entity Framework: Database Access for Enterprise Applications
- Pro Entity Framework 4.0
- Pro Oracle Identity and Access Management Suite
- Professional ADO.NET 3.5 with LINQ and the Entity Framework
IT Skills
- ASP.NET Core for Jobseekers: Build Career in Designing Cross-Platform Web Applications Using Razor and Entity Framework Core
- Beginning Entity Framework Core 5: From Novice to Professional
- Entity Framework Core in Action, Second Edition
- Pro ASP.NET Core Identity: Under the Hood with Authentication and Authorization in ASP.NET Core 5 and 6 Applications
- Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management
- Self-Sovereign Identity
Marketing
- Brand EsSense: Using Sense, Symbol and Story to Design Brand Identity
- Designing Brand Identity: A Complete Guide to Creating, Building, and Maintaining Strong Brands
- Designing Brand Identity: An Essential Guide for the Entire Branding Team, Fifth Edition
- Designing Brand Identity: An Essential Guide for the Whole Branding Team, Fourth Edition
- Taking Brand Initiative: How Companies Can Align Strategy, Culture, and Identity Through Corporate Branding
Network Security Specialist to CloudOps Security Architect
Professional Effectiveness
Security
- Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
- Electronic Identity
- Federated Identity Primer
- Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
- Identity Management Audit/Assurance Program
- Identity Management Audit/Assurance Program
- Identity Management: Concepts, Technologies, and Systems
- Introduction to Identity-Based Encryption
- Mechanics of User Identification and Authentication: Fundamentals of Identity Management
- Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
- Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
- Phishing and Counter Measures: Understanding the Increasing Problem of Electronic Identity Theft
- Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments
- Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
- Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Theives
- The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
Software Design and Development
- Access Control Systems: Security, Identity Management and Trust Models
- ASP.NET MVC with Entity Framework and CSS
- Beginning Entity Framework Core 2.0: Database Access from .NET
- Biometrics in Identity Management: Concepts to Applications
- Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity
- Building a Web App with Blazor and ASP.NET Core: Create a Single Page App with Blazor Server and Entity Framework Core
- Entity Framework Core in Action
- Pro Entity Framework Core 2 for ASP.NET Core MVC
Web Development and Graphic Design
Video Course
Cloud Computing and Virtualization
- AWS: Virtual Machines and Identity and Access Management
- Cloud Computing Fundamentals: Identity, Presence, and Privacy
- MS-100 - Microsoft 365 Identity and Services: Authentication
- MS-100 - Microsoft 365 Identity and Services: Office 365 Workload Deployment
- MS-300: Deploying Microsoft 365 Teamwork: Identity and Authentication for Teams
Cybersecurity Collection
Developer Collection
HR Compliance
Information Technology
- Encore Session 2: Communication, Network Security, Identity and Access Management (IAM)
- Encore Session 5: Access Control and Identity Management
- Identity with Windows Server 2016 Expert Live with Encore
- Live Session 4: Security Protocols and Issues, Identity and Access
- Post-Test 2: Communication, Network Security, Identity and Access Management (IAM)
- Post-Test 4: Security Protocols and Issues, Identity and Access
- Post-Test 5: Access Control and Identity Management
- Pre-Test 2: Communication, Network Security, Identity and Access Management (IAM)
- Pre-Test 4: Security Protocols and Issues, Identity and Access
Internet and Network Technologies Solution Area
- AWS Developer Associate 2021: Identity & Access Management
- AWS Developer Associate: Identity & Access Management
- AWS SysOps Associate 2021: Identity & Access Management
- AWS SysOps Associate: AWS Directory Services & Identity Federation
- CISM 2020: Identity & Access Management
- Cloud Identity Management
- CompTIA Security+ SY0-501: Identity Concepts and Access Services
- MS-100 - Microsoft 365 Identity and Services: Application Access
- MS-100 - Microsoft 365 Identity and Services: Application Deployment
- MS-100 - Microsoft 365 Identity and Services: External Users
- MS-100 - Microsoft 365 Identity and Services: Migrating Users & Data
- Securing AWS: Identity & Access Management
IT Infrastructure Practice Labs
Leadership Networking
Legal Compliance
Microsoft
- ASP.NET MVC Web Applications: Databases & Entity Framework
- Authentication and Identity Management
- AZ-500 - Microsoft Azure Security Technologies: Identity & Access Management
- Mentoring 70-742 Identity with Windows Server 2016
- MS-100 - Microsoft 365 Identity and Services: Designing a Hybrid Identity
- MS-100 - Microsoft 365 Identity and Services: Identity Strategy
- MS-100 - Microsoft 365 Identity and Services: Manage Azure AD Identities
- MS-100 - Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
- MS-100 - Microsoft 365 Identity and Services: Planning a Microsoft Implementation
- MS-100 - Microsoft 365 Identity and Services: Subscription & Tenant Health
- MS-100 - Microsoft 365 Identity and Services: Tenancy & Subscriptions
- MS-100 - Microsoft 365 Identity and Services: User Roles
- Server 2016 - Identity: Active Directory Accounts & Permissions
- Server 2016 - Identity: Active Directory Domain Controllers
- Server 2016 - Identity: Active Directory Federation Services & Web Application Proxy
- Server 2016 - Identity: Active Directory Group Policy Preferences
- Server 2016 - Identity: Active Directory Group Policy Settings
- Server 2016 - Identity: Active Directory Service Authentication & Account Policies
- TestPrep 70-742 Identity with Windows Server 2016
Operating Systems and Server Technologies Solution Area
Operating Systems and Servers
- Server 2016 - Identity: Active Directory Certificate Services
- Server 2016 - Identity: Active Directory Group Policy Processing
- Server 2016 - Identity: Active Directory Rights Management Services
- Server 2016 - Identity: Active Directroy Maintenance & Recovery
- Windows 10: Designing for Cloud and Hybrid Identity
Software Design and Development
Software Development Solution Area
Bootcamp
Information Technology
- Encore Session 2: Communication, Network Security, Identity and Access Management (IAM)
- Encore Session 5: Access Control and Identity Management
- Identity with Windows Server 2016 Expert Live with Encore
- Live Session 4: Security Protocols and Issues, Identity and Access
- Post-Test 2: Communication, Network Security, Identity and Access Management (IAM)
- Post-Test 4: Security Protocols and Issues, Identity and Access
- Post-Test 5: Access Control and Identity Management
- Pre-Test 2: Communication, Network Security, Identity and Access Management (IAM)
- Pre-Test 4: Security Protocols and Issues, Identity and Access