From the reviews:
Describes the principles of authentication, authorization, and privilege management on computer systems, and EIdM systems (EIdMS) provide the technical solutions for administering these privileges. provides the foundation needed to support decision-making processes that can successfully justify an EIdMS implementation. will be a valuable aid to professionals working in this area. (David B. Henderson, Computing Reviews, January, 2014)