Linked to FindBook      Google Book      Amazon      博客來     
  • Identity attack vectors = strategically designing and implementing identity security /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Identity attack vectors/ by Morey J. Haber, Darran Rolls.
    Reminder of title: strategically designing and implementing identity security /
    Author: Haber, Morey J.
    other author: Rolls, Darran.
    Published: Berkeley, CA :Apress : : 2024.,
    Description: xxii, 299 p. :ill., digital ;24 cm.
    [NT 15003449]: Chapter 1: Introduction: The Machine -- Chapter 2: Introduction -- Chapter 3: -- Chapter 4: -- Chapter 5: Identity Access Denied -- Chapter 6: Understanding Enterprise Identity -- Chapter 7. Identity and Access Management -- Chapter 8: Privileged Access Management (PAM) -- Chapter 9: Identity Threat Detection and Response -- Chapter 10: Indicators of Compromise -- Chapter 11: Identity Attack Vectors -- Chapter 12: The Identity Cyber Kill Chain -- Chapter 13: Six Steps to Identity Security -- Chapter 14: Emerging Identity Security Threats -- Chapter 15: Complexity Inherent in the IAM System -- Chapter 16: Identity Technical Debt -- Chapter 17: Identity Digital Transformation -- Chapter 18: Just in Time Access Management -- Chapter 19: Zero Trust for Identity Security -- Chapter 20: Identity Obfuscation -- Chapter 21: Regulatory Compliance -- Chapter 22: Key Takeaways -- Chapter 23: A Final Thought on Vendors -- Chapter 24: Conclusion -- Appendix A: Identity Security Sample RFP Questions -- Appendix B: Zero Trust Department of Defense (DoD) Framework.
    Contained By: Springer Nature eBook
    Subject: Computer security. -
    Online resource: https://doi.org/10.1007/979-8-8688-0233-1
    ISBN: 9798868802331
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login