现在位置 >首页 >
所有关于身份识别的文章
Book Description:
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.
As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Man...
随便看看
- A. 显微镜下的大明
- B. 无懈可击的web设计
- C. 俞敏洪教你创业
- D. The Agile Architecture Revolution
- E. 在傻子和英雄之间:群众社会的两张面孔
- F. 飞剪号奇航
- G. Oracle DBA手记:数据库诊断案例与性能优化实践
- H. 中国通史