Skip to content
VuFind
Advanced
Advanced
  • Identity attack vectors :
  • Preview
  • Cite this
  • Export Record
    • Export to MARC
Cover Image
QR Code
Preview
Preview
Preview

Identity attack vectors : implementing an effective identity and access management solution

Main Author: Haber, Morey J
Other Authors: Rolls, Darran
Subjects:
Identity theft
Computer security
Electronic books
Online Access: http://library.unisel.edu.my/web/guest/mylibrary
  • Holdings
  • Description
  • Reviews
  • Preview
  • Similar Items
  • Staff View

Similar Items

  • Crimeware : understanding new attacks and defenses
    Published: (2008)
  • Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
    by: Brancik, Kenneth C
    Published: (2008)
  • Cyber operations : building, defending, and attacking modern computer networks
    by: O'Leary, Mike
  • Securing SQL server : protecting your database from attackers
    by: Cherry, Denny
    Published: (2011)
  • Implementing an information security management system : security management based on ISO 27001 guidelines
    by: Chopra, Abhishek

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...