IDENTITY-NATIVE INFRASTRUCTURE ACCESS MANAGEMENT preventing breaches by eliminating secrets and adopting zero trust /
Call Number: | Libro Electrónico |
---|---|
Main Authors: | Kontsevoy, Ev (Author), Shah, Sakshyam (Author), Conrad, Peter (Author) |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Sebastopol, CA :
O'Reilly Media, Inc.,
[2023]
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Similar Items
-
Everything you need to know about performing a network risk analysis /
by: Beachy, Robert
Published: (2012) -
The cybersecurity workforce of tomorrow /
by: Nizich, Michael
Published: (2023) -
A cyberworm that knows no boundaries /
by: Porche, Isaac, 1968-
Published: (2011) -
Best Practices in Computer Network Defense : Incident Detection and Response.
by: Hathaway, M.
Published: (2014) -
A cyberworm that knows no boundaries /
by: Porche, Isaac, 1968-
Published: (2011)