FindBook      Google Book      Amazon      博客來     
  • Identity attack vectors = strategically designing and implementing identity security /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Identity attack vectors/ by Morey J. Haber, Darran Rolls.
    其他題名: strategically designing and implementing identity security /
    作者: Haber, Morey J.
    其他作者: Rolls, Darran.
    出版者: Berkeley, CA :Apress : : 2024.,
    面頁冊數: xxii, 299 p. :ill., digital ;24 cm.
    內容註: Chapter 1: Introduction: The Machine -- Chapter 2: Introduction -- Chapter 3: -- Chapter 4: -- Chapter 5: Identity Access Denied -- Chapter 6: Understanding Enterprise Identity -- Chapter 7. Identity and Access Management -- Chapter 8: Privileged Access Management (PAM) -- Chapter 9: Identity Threat Detection and Response -- Chapter 10: Indicators of Compromise -- Chapter 11: Identity Attack Vectors -- Chapter 12: The Identity Cyber Kill Chain -- Chapter 13: Six Steps to Identity Security -- Chapter 14: Emerging Identity Security Threats -- Chapter 15: Complexity Inherent in the IAM System -- Chapter 16: Identity Technical Debt -- Chapter 17: Identity Digital Transformation -- Chapter 18: Just in Time Access Management -- Chapter 19: Zero Trust for Identity Security -- Chapter 20: Identity Obfuscation -- Chapter 21: Regulatory Compliance -- Chapter 22: Key Takeaways -- Chapter 23: A Final Thought on Vendors -- Chapter 24: Conclusion -- Appendix A: Identity Security Sample RFP Questions -- Appendix B: Zero Trust Department of Defense (DoD) Framework.
    Contained By: Springer Nature eBook
    標題: Computer security. -
    電子資源: https://doi.org/10.1007/979-8-8688-0233-1
    ISBN: 9798868802331
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入