Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization
Enregistré dans:
Auteur principal: | Rains, Tim. (Auteur) |
---|---|
Autres auteurs: | Youngblood Cissp, Timothy. (Préface) |
Support: | E-Book |
Langue: | Anglais |
Publié: |
Birmingham :
Packt Publishing.
|
Autres localisations: | Voir dans le Sudoc |
Accès en ligne: | Accès à l'E-book |
Documents similaires
-
Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization
par: Sehgal, Kunal. -
Cybersecurity - Attack and Defense Strategies : Improve your security posture to mitigate risks and prevent attackers from infiltrating your system
par: Diogenes, Yuri (19..-....). -
Cybersecurity and Third-Party Risk : Third Party Threat Hunting
par: Rasner, Gregory C.. -
Modern Cybersecurity Practices : Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
par: Ackerman, Pascal. -
The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs
par: Maurice, Chad.
Publié: 2022