Apply Principle of Least Privileges for Access Control

Loading...
From the course by University of Colorado System
Design and Analyze Secure Networked Systems
26 оценки
University of Colorado System
26 оценки
Course 1 of 4 in the Specialization Fundamentals of Computer Network Security
From the lesson
Protect Data Access and Verify Source of Trust

Meet the Instructors

  • Edward Chow
    Edward Chow
    Professor
    Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.