Skip to Content
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
book

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

by Morey J. Haber, Darran Rolls
December 2019
Intermediate to advanced content levelIntermediate to advanced
205 pages
5h 2m
English
Apress
Content preview from Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_5

5. Bots

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

Have you ever asked your home smart device what the weather will be like today or the score of last night’s football game? You’re not alone. The explosion in virtual assistants in the home environments underscores the reality that software and interactive self-service autonomous consumer applications are now an intricate and interwoven part of our lives.

This explosion in the consumer space is being mirrored in enterprise computing too. Virtual assistants and other autonomous software “bots” are nearing the zenith of their hype-cycle. From customer ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Michael Schwartz, Maciej Machulak

Publisher Resources

ISBN: 9781484251652Purchase LinkPublisher Website