Security superstream : zero trust /
With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with...
Call Number: | Libro Electrónico |
---|---|
Format: | Electronic Video |
Language: | Inglés |
Published: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
2022.
|
Edition: | [First edition]. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Similar Items
-
Security superstream : security in the cloud.
Published: (2022) -
Ransomware /
Published: (2022) -
Case study : how Tools & Solutions survived a ransomware attack.
Published: (2022) -
Cyber fraud tactics, techniques and procedures /
by: Howard, Rick
Published: (2009) -
Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.
Published: (2013)