Identity Attack Vectors: Implementing an Effective Identity and Access Management Solutionby Haber, Morey J.; Rolls, DarranMay have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less