|
Identity Attack Vectors : Strategically Designing and Implementing Identity Security, Second Edition
Subjects:
“...Data protection...”
|
by Haber, Morey J., Hibbert, Brad
Published 2018
Table of Contents:
“... Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10...”Published 2018
Apress, Distributed to the Book trade worldwide by Springer