Cargando…
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Autor principal: | Haber, Morey |
---|---|
Lenguaje: | eng |
Publicado: |
Apress
2019
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2740086 |
Ejemplares similares
-
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
por: Haber, Morey
Publicado: (2020) -
Asset attack vectors: building effective vulnerability management strategies to protect organizations
por: Haber, Morey J, et al.
Publicado: (2018) -
Identity Management with Biometrics
por: Bock, Lisa
Publicado: (2020) -
Identity, authentication, and access management in OpenStack: implementing and deploying Keystone, OpenStack's identity service
por: Martinelli, Steve, et al.
Publicado: (2015) -
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
por: Mustafa, Osama
Publicado: (2019)