Related Books
Language: en
Pages: 240
Pages: 240
Type: BOOK - Published: 2022-06-28 - Publisher: Springer Nature
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes preventi
Language: en
Pages: 397
Pages: 397
Type: BOOK - Published: 2020-10-01 - Publisher: Jones & Bartlett Learning
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of acc
Language: en
Pages: 403
Pages: 403
Type: BOOK - Published: 2020-06-13 - Publisher: Apress
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c
Language: en
Pages: 205
Pages: 205
Type: BOOK - Published: 2019-12-17 - Publisher: Apress
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identit
Language: en
Pages: 649
Pages: 649
Type: BOOK - Published: 2013-11-19 - Publisher: Newnes
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess,