Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("actor" OR "factor")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Haber, Morey J."
dewey-ones:"005 - Computer programming, programs & data"
Search alternatives
:
"actor" »
"actors"
,
"autor"
"factor" »
"factors"
,
"fautor"
Showing
1
-
7
of
7
Search:
'("actor" OR "factor")'
,
query time: 0.09s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Identity attack vectors : strategically designing and implementing identity security
by
Haber, Morey J.
,
Rolls, Darran
Published 2024
Apress
“
...Today, it's easier for threat
actors
to simply log in versus hack in. As cyberattacks continue...
”
Call Number:
QA76.9.A25
Read Now
2
Identity Attack Vectors : Strategically Designing and Implementing Identity Security, Second Edition
by
Haber, Morey J.
,
Rolls, Darran
Published 2024
Apress
Read Now
3
Cloud Attack Vectors : Building Effective Cyber-Defense Strategies to Protect Cloud Resources
by
Haber, Morey J.
,
Chappell, Brian
,
Hills, Christopher
Published 2022
Apress
“
... an organization will be breached. Threat
actors
typically target the path of least resistance...
”
Read Now
4
Identity Attack Vectors : Implementing an Effective Identity and Access Management Solution
by
Haber, Morey J.
,
Rolls, Darran
Published 2020
Apress
Read Now
5
Privileged Attack Vectors : Building Effective Cyber-Defense Strategies to Protect Organizations
by
Haber, Morey J.
Published 2020
Apress
“
.... It is not a matter of if, but when, your organization will be breached. Threat
actors
target the path of least...
”
Read Now
6
Privileged attack vectors : building effective cyber-defense strategies to protect organizations
by
Haber, Morey J.
Published 2020
Apress
“
.... It is not a matter of if, but when, your organization will be breached. Threat
actors
target the path of least...
”
Call Number:
QA76.9.A25
Read Now
7
Identity attack vectors : implementing an effective identity and access management solution
by
Haber, Morey J.
Published 2020
Apress L.P.
Call Number:
QA76.9.A25
Back
Narrow Search
Remove Filters
Clear Filter
Author: Haber, Morey J.
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
1
658 - General management
1
Language
English
7
Collection
Springer eBooks 2005-
4
O'Reilly
3
Author
Haber, Morey J.
Rolls, Darran
4
Chappell, Brian
1
Hills, Christopher
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Haber%2C+Morey+J.%22&filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%28%22actor%22+OR+%22factor%22%29&type=AllFields
Send by Email
×
Loading...