Crimeware : understanding new attacks and defenses
Published: (2008)
Identity attack vectors : implementing an effective identity and access management solution
Main Author: | Haber, Morey J |
---|---|
Other Authors: | Rolls, Darran |
Subjects: | |
Online Access: |
http://library.unisel.edu.my/web/guest/mylibrary |
Similar Items
-
Crimeware : understanding new attacks and defenses
Published: (2008) -
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C
Published: (2008) -
Cyber operations : building, defending, and attacking modern computer networks
by: O'Leary, Mike -
Securing SQL server : protecting your database from attackers
by: Cherry, Denny
Published: (2011) -
Implementing an information security management system : security management based on ISO 27001 guidelines
by: Chopra, Abhishek