Privileged attack vectors = building...
Haber, Morey J.

Linked to FindBook      Google Book      Amazon      博客來     
  • Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Privileged attack vectors/ by Morey J. Haber, Brad Hibbert.
    Reminder of title: building effective cyber-defense strategies to protect organizations /
    Author: Haber, Morey J.
    other author: Hibbert, Brad.
    Published: Berkeley, CA :Apress : : 2018.,
    Description: xxvii, 247 p. :ill., digital ;24 cm.
    [NT 15003449]: Chapter 1: Privileges -- Chapter 2: Shared Credentials -- Chapter 3: Password Hacking -- Chapter 4: Privilege Escalation -- Chapter 5: Insider Threats -- Chapter 6: Insider Threats -- Chapter 7: Threat Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10: Privilege Access Management -- Chapter 11: PAM Architecture -- Chapter 12: Break Glass -- Chapter 13: Industrial Control Systems (ICS) -- Chapter 14: Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19: Regulatory Compliance -- Chapter 20: Sample PAM Use Cases -- Chapter 21: Deployment Considerations -- Chapter 22: Privileged Account Management Implementation -- Chapter 23: Key Takeaways -- Chapter 24: Conclusion.
    Contained By: Springer eBooks
    Subject: Computer security. -
    Online resource: http://dx.doi.org/10.1007/978-1-4842-3048-0
    ISBN: 9781484230480
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login