Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...

Full description

Bibliographic Details
Main Authors: Haber, Morey J. (Author, http://id.loc.gov/vocabulary/relators/aut), Hibbert, Brad (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2018.
Edition:1st ed. 2018.
Subjects:
Online Access:Full Text via HEAL-Link

Similar Items