Show Summary Details
Abstract Data and Attack Vectors: Re-Interpreting the Threat Landscape Primacy of ‘Identity’ Data Points Security Operations: Identity Profiles and the Foundations of a New Data Architecture The Silent Partner: Data Driven Security Architecture Profiling: ...
Chapter 23: Data Architecture: Cybersecurity's Silent Partner
Cyber Security: Law and Guidance
- Author:
- Helen Wong
- Publisher:
- Bloomsbury Professional
- Edition:
- Second edition
- Publication Date:
- 2025
If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.