"According to Gartner IT Glossary (2012), "identity and access management (lAM) is the security discipline that enabled the right individuals to access the right resources at the right times for the right reasons." Simply put, it is making sure your users are who they say they are and only have acce
...
ss to what you want them to have access to. In addition to preventing unauthorised parties from exploiting your organisation 's resources, lAM technologies can help manage subscriptions to online resources where cost is based on the number of users accessing protected content." (Page 2)
more
"The authors of all kinds of works, from the humble email to blockbuster films, rely on copyright to protect what they produce. But authors and those who use their work are often unclear about what copyright allows and what it prohibits. This book was written for those who want to learn about copyri
...
ght in the 21st century. It explains copyright protection and what it means for copyright holders and copyright users. It also introduces readers to contemporary topics: digital rights management, open licences, software patents and copyright protection for works of traditional knowledge. A final chapter tries to predict how technology will change the publishing and entertainment industries that depend on copyright. The book assumes no special knowledge and avoids technical language as much as possible." (Publisher description)
more
"Aiming to bring some of the network-cultural forms of collaboration into ICT debates dominated by standard policy and research procedure, the Incommunicado project does not offer a univocal master-narrative of what’s wrong with the world of ICT, or of how it should be. Members of the Incommunicad
...
o network are pursueing multiple vectors of inquiry that are unlikely to converge in yet another civil society declaration or intergovernmental policy proposal but - at best - coordinate possible interventions across the imperial terrain of a global network economy, at least heighten our sense of the incommensurability of competing info-political visions. To stress the simultaneity of these efforts, and to take stock of where we think incommunicado ‘is’ at the time of this writing, the entries below are a first attempt to identify some of these vectors." (Instead of an introduction, page 3)
more