Privileged attack vectors : building effective cyber-defense strategies to protect organizations /
Saved in:
Author / Creator: | Haber, Morey J., author. |
---|---|
Edition: | Second edition. |
Imprint: | [United States] : Apress, 2020. |
Description: | 1 online resource (xxxv, 384 pages) : color illustrations |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12605846 |
Table of Contents:
- Chapter 1: Privileged Attack Vectors
- Chapter 2: Privileges
- Chapter 3: Credentials
- Chapter 4: Attack Vectors
- Chapter 5: Passwordless Authentication
- Chapter 6: Privilege Escalation
- Chapter 7: Insider and External Threats
- Chapter 8: Threat Hunting
- Chapter 9: Unstructured Data
- Chapter 10: Privileged Monitoring
- Chapter 11: Privileged Access Management
- Chapter 12: PAM Architecture
- Chapter 13: Break Glass
- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT)
- Chapter 15: The Cloud
- Chapter 16: Mobile Devices
- Chapter 17: Ransomware and Privileges
- Chapter 18: Remote Access
- Chapter 19: Secured DevOps (SecDevOps)
- Chapter 20: Regulatory Compliance
- Chapter 21: Just in Time
- Chapter 22: Zero Trust
- Chapter 23: Sample Privileged Access Management Use Cases
- Chapter 24: Deployment Considerations
- Chapter 25: Privileged Account Management Implementation
- Chapter 26: Machine Learning
- Chapter 27: Conclusion
- Index.