Related Books

Privileged Attack Vectors
Language: en
Pages: 403
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2020-06-13 - Publisher: Apress

GET EBOOK

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c
Identity Attack Vectors
Language: en
Pages: 205
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2019-12-17 - Publisher: Apress

GET EBOOK

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identit
Asset Attack Vectors
Language: en
Pages: 391
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2018-06-15 - Publisher: Apress

GET EBOOK

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic
Container Security
Language: en
Pages: 201
Authors: Liz Rice
Categories: Computers
Type: BOOK - Published: 2020-04-06 - Publisher: O'Reilly Media

GET EBOOK

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do yo
Identity Attack Vectors
Language: en
Pages: 301
Authors: Morey J. Haber
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

GET EBOOK