Cargando…
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Autor principal: | Haber, Morey |
---|---|
Lenguaje: | eng |
Publicado: |
Apress
2020
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2740268 |
Ejemplares similares
-
Privileged attack vectors: building effective cyber-defense strategies to protect organizations
por: Haber, Morey J, et al.
Publicado: (2018) -
Asset attack vectors: building effective vulnerability management strategies to protect organizations
por: Haber, Morey J, et al.
Publicado: (2018) -
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
por: Haber, Morey
Publicado: (2019) -
Cyber operations: building, defending, and attacking modern computer networks
por: O'Leary, Mike
Publicado: (2019) -
Ransomware and Privileges
por: Haber, Morey J.
Publicado: (2020)