回首頁 到查詢結果 [ subject:"Identity theft." ]

Identity attack vectors = implementi...
Haber, Morey J.

FindBook      Google Book      Amazon      博客來     
  • Identity attack vectors = implementing an effective identity and access management solution /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Identity attack vectors/ by Morey J. Haber, Darran Rolls.
    其他題名: implementing an effective identity and access management solution /
    作者: Haber, Morey J.
    其他作者: Rolls, Darran.
    出版者: Berkeley, CA :Apress : : 2020.,
    面頁冊數: xxiii, 196 p. :ill., digital ;24 cm.
    內容註: Chapter 1: The Three Pillars of Cybersecurity -- Chapter 2: A Nuance on Lateral Movement -- Chapter 3: The Five A's of Enterprise IAM -- Chapter 4: Understanding Enterprise Identity -- Chapter 5: BOTS -- Chapter 6: Identity Governance Defined -- Chapter 7: The Identity Governance Process -- Chapter 8: Meeting Regulatory Compliance Mandates -- Chapter 9: Indicators of Compromise -- Chapter 10: Identity Attack Vectors -- Chapter 11: Identity Management Controls in the Cyber Kill Chain -- Chapter 12: Identity Management Program Planning -- Chapter 13: Privileged Access Management -- Chapter 14: Just-In-Time Access Management -- Chapter 15: Identity Obfuscation -- Chapter 16: System for Cross-domain Identity Management (SCIM) -- Chapter 17: Remote Access -- Chapter 18: Identity-Based Threat Response -- Chapter 19: Biometric Risks Related to Identities -- Chapter 20: Blockchain and Identity Management -- Chapter 21: Conclusion.
    Contained By: Springer eBooks
    標題: Computer security. -
    電子資源: https://doi.org/10.1007/978-1-4842-5165-2
    ISBN: 9781484251652
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9390246 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 H334 2020 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入