Privileged Access Control Methods
Chapter 13 builds on the foundational theory of privileged access control (PAC) already described in Chapter 12 by providing a survey of the PAC solutions in the market, followed by a generic analysis of the basic methods of how they work.
KeywordsAccess Control Target Server Destination Server Foundational Theory Schema Owner
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
© Paul Wright 2014