Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations /
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to th...
Κύριοι συγγραφείς: | Haber, Morey J. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Hibbert, Brad (http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2018.
|
Έκδοση: | 1st ed. 2018. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /
ανά: Haber, Morey J., κ.ά.
Έκδοση: (2018) -
Ransomware Revealed A Beginner's Guide to Protecting and Recovering from Ransomware Attacks /
ανά: Hassan, Nihad A., κ.ά.
Έκδοση: (2019) -
Cyber Operations Building, Defending, and Attacking Modern Computer Networks /
ανά: O'Leary, Mike, κ.ά.
Έκδοση: (2019) -
Solving Identity Management in Modern Applications Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
ανά: Wilson, Yvonne, κ.ά.
Έκδοση: (2019) -
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence /
ανά: Hassan, Nihad A., κ.ά.
Έκδοση: (2018)