Search Results


Related Books

Threat Vector
Language: en
Pages: 609
Authors: Tom Clancy
Categories: Fiction
Type: BOOK - Published: 2013-12-03 - Publisher: Penguin

DOWNLOAD EBOOK

For President Jack Ryan, his son Jack Ryan, Jr., and the covert organization known as The Campus, the fight against America’s enemies is never over. But the d
Privileged Attack Vectors
Language: en
Pages: 403
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2020-06-13 - Publisher: Apress

DOWNLOAD EBOOK

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks c
Identity Attack Vectors
Language: en
Pages: 205
Authors: Morey J. Haber
Categories: Computers
Type: BOOK - Published: 2019-12-17 - Publisher: Apress

DOWNLOAD EBOOK

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identit
Tom Clancy Commander in Chief
Language: en
Pages: 738
Authors: Mark Greaney
Categories: Jack Ryan
Type: BOOK - Published: 2015 - Publisher: Riverhead Books

DOWNLOAD EBOOK

Jack Ryan is presented with yet another deadly mission in the latest thriller by Mark Greaney, Tom Clancy's last and most successful collaborator
Cybercrime and Espionage
Language: en
Pages: 270
Authors: Will Gragido
Categories: Computers
Type: BOOK - Published: 2011-01-07 - Publisher: Newnes

DOWNLOAD EBOOK

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cyber
Scroll to top