回首頁 到查詢結果 [ subject:"Computer security- Management." ]

Privileged attack vectors = building...
Haber, Morey J.

FindBook      Google Book      Amazon      博客來     
  • Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Privileged attack vectors/ by Morey J. Haber.
    其他題名: building effective cyber-defense strategies to protect organizations /
    作者: Haber, Morey J.
    出版者: Berkeley, CA :Apress : : 2020.,
    面頁冊數: xxxv, 384 p. :ill., digital ;24 cm.
    內容註: Chapter 1: Privileged Attack Vectors -- Chapter 2: Privileges -- Chapter 3: Credentials -- Chapter 4: Attack Vectors -- Chapter 5: Passwordless Authentication -- Chapter 6: Privilege Escalation -- Chapter 7: Insider and External Threats -- Chapter 8: Threat Hunting -- Chapter 9: Unstructured Data -- Chapter 10: Privileged Monitoring -- Chapter 11: Privileged Access Management -- Chapter 12: PAM Architecture -- Chapter 13: Break Glass -- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges -- Chapter 18: Remote Access -- Chapter 19: Secured DevOps (SecDevOps) -- Chapter 20: Regulatory Compliance -- Chapter 21: Just in Time -- Chapter 22: Zero Trust -- Chapter 23: Sample Privileged Access Management Use Cases -- Chapter 24: Deployment Considerations -- Chapter 25: Privileged Account Management Implementation -- Chapter 26: Machine Learning -- Chapter 27: Conclusion.
    Contained By: Springer eBooks
    標題: Information technology - Security measures. -
    電子資源: https://doi.org/10.1007/978-1-4842-5914-6
    ISBN: 9781484259146
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9394986 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 H334 2020 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入