Identity attack vectors : implementing an effective identity and access management solution / Morey J. Haber, Darran Rolls.

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Skillsoft)
Main Author: Haber, Morey J.
Other Authors: Rolls, Darran
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress L.P., ©2020.
Subjects:

Internet

Full Text (via Skillsoft)

Online

Holdings details from Online
Call Number: QA76.9.A25
QA76.9.A25 Available