Identity attack vectors : implementing an effective identity and access management solution / Morey J. Haber, Darran Rolls.
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berkeley, CA :
Apress L.P.,
©2020.
|
Subjects: |
Internet
Full Text (via Skillsoft)Online
Call Number: |
QA76.9.A25
|
---|---|
QA76.9.A25 | Available |