回首頁 到查詢結果 [ subject:"Computer networks- Access control." ]

Privileged attack vectors = building...
Haber, Morey J.

FindBook      Google Book      Amazon      博客來     
  • Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Privileged attack vectors/ by Morey J. Haber, Brad Hibbert.
    其他題名: building effective cyber-defense strategies to protect organizations /
    作者: Haber, Morey J.
    其他作者: Hibbert, Brad.
    出版者: Berkeley, CA :Apress : : 2018.,
    面頁冊數: xxvii, 247 p. :ill., digital ;24 cm.
    內容註: Chapter 1: Privileges -- Chapter 2: Shared Credentials -- Chapter 3: Password Hacking -- Chapter 4: Privilege Escalation -- Chapter 5: Insider Threats -- Chapter 6: Insider Threats -- Chapter 7: Threat Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10: Privilege Access Management -- Chapter 11: PAM Architecture -- Chapter 12: Break Glass -- Chapter 13: Industrial Control Systems (ICS) -- Chapter 14: Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19: Regulatory Compliance -- Chapter 20: Sample PAM Use Cases -- Chapter 21: Deployment Considerations -- Chapter 22: Privileged Account Management Implementation -- Chapter 23: Key Takeaways -- Chapter 24: Conclusion.
    Contained By: Springer eBooks
    標題: Computer security. -
    電子資源: http://dx.doi.org/10.1007/978-1-4842-3048-0
    ISBN: 9781484230480
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入