| PDF - Angenommene Version frei zugänglich ab 15.7.25 (363kB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-586583
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.58658
Zusammenfassung
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

Downloadstatistik