Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...
Κύριοι συγγραφείς: | Haber, Morey J. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Hibbert, Brad (http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2018.
|
Έκδοση: | 1st ed. 2018. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations /
ανά: Haber, Morey J., κ.ά.
Έκδοση: (2018) -
Cyber Operations Building, Defending, and Attacking Modern Computer Networks /
ανά: O'Leary, Mike, κ.ά.
Έκδοση: (2019) -
Ransomware Revealed A Beginner's Guide to Protecting and Recovering from Ransomware Attacks /
ανά: Hassan, Nihad A., κ.ά.
Έκδοση: (2019) -
Waging Cyber War Technical Challenges and Operational Constraints /
ανά: Oakley, Jacob G., κ.ά.
Έκδοση: (2019) -
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence /
ανά: Hassan, Nihad A., κ.ά.
Έκδοση: (2018)