Vendeur : medimops, Berlin, Allemagne
EUR 10,82
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Vendeur : Better World Books: West, Reno, NV, Etats-Unis
EUR 20,19
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. Used book that is in clean, average condition without any missing pages.
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
EUR 26,16
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 0.87.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 44,44
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2024
ISBN 13 : 9798868802324
Langue: anglais
Vendeur : Rarewaves USA, OSWEGO, IL, Etats-Unis
EUR 51,15
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Second Edition. Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities-whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 37,31
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2024
ISBN 13 : 9798868802324
Langue: anglais
Vendeur : Rarewaves USA United, OSWEGO, IL, Etats-Unis
EUR 53,26
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Second Edition. Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities-whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments.
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
EUR 26,10
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
ISBN 10 : 8868806703 ISBN 13 : 9788868806705
Vendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
EUR 29,68
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide.
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2024
ISBN 13 : 9798868802324
Langue: anglais
Vendeur : Rarewaves.com UK, London, Royaume-Uni
EUR 55,88
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Second Edition. Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities-whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 41,98
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Edité par Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2024
ISBN 13 : 9798868802324
Langue: anglais
Vendeur : Rarewaves.com USA, London, LONDO, Royaume-Uni
EUR 60,24
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Second Edition. Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities-whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments.
ISBN 10 : 8868806703 ISBN 13 : 9788868806705
Vendeur : Basi6 International, Irving, TX, Etats-Unis
EUR 29,68
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierEtat : Brand New. New.SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 48,99
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 52,66
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 59,51
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 219 pages. 9.25x6.10x0.55 inches. In Stock.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 72,33
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Edité par Apress, 2024
Vendeur : Books From California, Simi Valley, CA, Etats-Unis
EUR 39,51
Autre deviseQuantité disponible : 3 disponible(s)
Ajouter au panierpaperback. Etat : Very Good. Cover and edges may have some wear.
Vendeur : Lakeside Books, Benton Harbor, MI, Etats-Unis
EUR 36,12
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
EUR 22,61
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 35,68
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
ISBN 10 : 8868802325 ISBN 13 : 9788868802325
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 47,30
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 299 2nd Edition.
ISBN 10 : 8868802325 ISBN 13 : 9788868802325
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 48,66
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 299.
ISBN 10 : 8868802325 ISBN 13 : 9788868802325
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 50,46
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. pp. 299.
Vendeur : moluna, Greven, Allemagne
EUR 52,37
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierKartoniert / Broschiert. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Today, it s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it s not a matter of if, but when, your organization will have an incident. Threat actors target accoun.