iso13335-2
Trust but Verify Leveraging Active Directory to Secure and Audit Access to On-premise and Cloud-based UNIX, Linux, and Mac Systems Centrify Corporation.
IT vs. OT: ICS Cyber Security in TSOs
Lecture 11 Intrusion Detection (cont) modified from slides of Lawrie Brown.
The Other Side of Information Security Wilco van Ginkel – Ubizen [email protected].
Chapter 8