Privileged attack vectors : building effective cyber-defense strategies to protect organizations / Morey J. Haber, Brad Hibbert.

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Skillsoft)
Main Authors: Haber, Morey J. (Author), Hibbert, Brad (Author)
Format: Electronic eBook
Language:English
Published: [United States] : Apress, 2018.
Subjects:

Internet

Full Text (via Skillsoft)

Online

Holdings details from Online
Call Number: QA76.9.A25 H33 2018
QA76.9.A25 H33 2018 Available