Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...

Full description

Saved in:
Bibliographic Details
Main Author: Haber, Morey J. (Author)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress, 2018.
Edition:1st ed. 2018.
Subjects:
ISBN:9781484230480
Online Access: Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!

Internet

Get full text

CVTI internet

Holdings details from CVTI internet
Call Number: ZE10306
Copy On Shelf