Identity attack vectors : implementing an effective identity and access management solution /
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Haber, Morey J. |
Otros Autores: | Rolls, Darran |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress L.P.,
©2020.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Identity theft in today's world /
por: McNally, Megan M.
Publicado: (2012) -
The truth about identity theft /
por: Stickley, Jim
Publicado: (2009) -
The truth about identity theft /
por: Weisman, Steve
Publicado: (2011) -
Identity theft and fraud : evaluating and managing risk /
Publicado: (2012) -
Identity theft alert : 10 rules you must follow to protect yourself from America's #1 crime /
por: Weisman, Steve
Publicado: (2014)