Related Books

Privileged Attack Vectors
Language: en
Pages: 403
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2020-06-13 - Publisher: Apress

DOWNLOAD EBOOK

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c
Identity Attack Vectors
Language: en
Pages: 205
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2019-12-17 - Publisher: Apress

DOWNLOAD EBOOK

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identit
Asset Attack Vectors
Language: en
Pages: 391
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2018-06-15 - Publisher: Apress

DOWNLOAD EBOOK

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic
Privilege Escalation Techniques
Language: en
Pages: 340
Authors: Alexis Ahmed
Categories: Computers
Type: BOOK - Published: 2021-11-25 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key FeaturesDiscover a range of t
Container Security
Language: en
Pages: 201
Authors: Liz Rice
Categories: Computers
Type: BOOK - Published: 2020-04-06 - Publisher: O'Reilly Media

DOWNLOAD EBOOK

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do yo