ALL > Computer and Education > courses > university courses > undergraduate courses > practice for Computer English Language > > > >
Detecting Credential Compromise in Enterprise Networks Version 0
👤 Author: by collector 2016-12-17 15:45:52
Detecting Credential Compromise in Enterprise Networks
Mobin Javed
EECS Department
University of California, Berkeley
Technical Report No. UCB/EECS-2016-216
December 16, 2016
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-216.pdf

Secure remote access is integral to the workflow of virtually every enterprise today. It is also an avenue ripe for network infiltration---attackers who can steal network-login credentials can often readily penetrate a site's perimeter security to

Please login to reply. Login

Reversion History

Loading...
No reversions found.