Security superstream : zero trust /
With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with...
Cote: | Libro Electrónico |
---|---|
Format: | Électronique Vidéo |
Langue: | Inglés |
Publié: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
2022.
|
Édition: | [First edition]. |
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Documents similaires
-
Security superstream : security in the cloud.
Publié: (2022) -
Ransomware /
Publié: (2022) -
Case study : how Tools & Solutions survived a ransomware attack.
Publié: (2022) -
Cyber fraud tactics, techniques and procedures /
par: Howard, Rick
Publié: (2009) -
Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.
Publié: (2013)