|
Identity Attack Vectors : Strategically Designing and Implementing Identity Security, Second Edition
Table of Contents:
“...: Identity Technical Debt -- Chapter 17: Identity Digital Transformation -- Chapter 18: Just in Time Access...”