Asset attack vectors : building effective vulnerability management strategies to protect organizations /
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to th...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Haber, Morey J. |
Otros Autores: | Hibbert, Brad |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
2018.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
por: Haber, Morey J.
Publicado: (2020) -
Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
por: Haber, Morey J., et al.
Publicado: (2018) -
Identity attack vectors : implementing an effective identity and access management solution /
por: Haber, Morey J.
Publicado: (2020) -
Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources /
por: Haber, Morey J., et al.
Publicado: (2022) -
Art of attack : attacker mindset for security professionals.
por: Reynolds, Maxie
Publicado: (2021)