Haber, Morey J.
Overview
Works: | 1 works in 5 publications in 1 languages |
---|
Titles
Identity attack vectors = implementing an effective identity and access management solution /
by:
Haber, Morey J.; Rolls, Darran.; SpringerLink (Online service)
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
Haber, Morey J.; Hibbert, Brad.; SpringerLink (Online service)
(Electronic resources)
Identity attack vectors = strategically designing and implementing identity security /
by:
Haber, Morey J.; Rolls, Darran.; SpringerLink (Online service)
(Electronic resources)
Cloud attack vectors = building effective cyber-defense strategies to protect cloud resources /
by:
Haber, Morey J.; Chappell, Brian.; Hills, Christopher.; SpringerLink (Online service)
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
Haber, Morey J.; SpringerLink (Online service)
(Electronic resources)
Subjects
Computer security.
Computer networks- Security measures.
Cyberterrorism.
Data and Information Security.
Data protection.
Computer networks- Access control.
Computer security- Management.
Information technology- Security measures.
Security.
Identity theft.
Cloud computing.
Cloud Computing.
Computer Science.
Cloud computing- Security measures.