Security superstream : zero trust /
With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with...
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
2022.
|
Edición: | [First edition]. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Security superstream : security in the cloud.
Publicado: (2022) -
Ransomware /
Publicado: (2022) -
Case study : how Tools & Solutions survived a ransomware attack.
Publicado: (2022) -
Cyber fraud tactics, techniques and procedures /
por: Howard, Rick
Publicado: (2009) -
Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.
Publicado: (2013)