Cargando…

Privileged attack vectors : building effective cyber-defense strategies to protect organizations /

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Haber, Morey J. (Autor), Hibbert, Brad (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : Apress, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)