Identity Attack Vectors Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t...

Descripción completa

Detalles Bibliográficos
Autores principales: Haber, Morey J. author (author), Rolls, Darran. author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2020.
Edición:1st ed. 2020.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631948406719

Ejemplares similares