Preventing good people from doing bad things implementing least privilege
In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Berkeley, Calif.] :
Apress
c2011.
|
Edición: | 1st ed. 2011. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629041506719 |
Tabla de Contenidos:
- Chapter 1: The Only IT Constant Is Change
- Chapter 2: Misuse of Privilege Is the New Corporate Landmine
- Chapter 3: Business Executives, Technologists, and Auditors Need Least Privilege
- Chapter 4: Supplementing Group Policy on Windows Desktops
- Chapter 5: Servers Are the Primary Target for Insiders and Hackers Alike
- Chapter 6: Protecting Virtual Environments from Hypervisor Sabotage
- Chapter 7: Secure Multi-Tenancy for Private, Public, and Hybrid Clouds
- Chapter 8: Applications, Databases, and Desktop Data Need Least Privilege, Too
- Chapter 9: Security Does Not Equal Compliance
- Chapter 10: The Hard and Soft Cost of Apathy
- Chapter 11: Final Thoughts for Least Privilege Best Practices