<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
Cybersecurity and Identity Access Management
β Scribed by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 246
- Edition
- 1st ed. 2023
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.Β Β
π SIMILAR VOLUMES
<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
This book presents a process-based approach to implementing Oracleβs Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Or
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides deta
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t