Ouça e leia

Entre em um mundo infinito de histórias

  • Ler e ouvir tanto quanto você quiser
  • Com mais de 500.000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 dias de teste gratuito, depois R$19,90/mês
  • Fácil de cancelar a qualquer momento
Assine agora
br bdp devices

Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA

Idiomas
Inglês
Format
Categoria

Não-ficção

Tags

    Outros também usufruíram...

    1. Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition Yuri Diogenes
    2. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
    3. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    4. Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh Rajneesh Gupta
    5. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
    6. Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques Muhiballah Mohammed
    7. Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security Rebecca Blair
    8. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
    9. Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps Tony Hsu
    10. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia