|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn935262202 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160123s2006 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MERUC
|d ZCU
|d S8J
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCF
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9780080512532
|
020 |
|
|
|a 0080512534
|
029 |
1 |
|
|a AU@
|b 000059584929
|
029 |
1 |
|
|a DEBBG
|b BV044121848
|
035 |
|
|
|a (OCoLC)935262202
|
050 |
|
4 |
|a TK5105.59 ǂb M38 2007eb
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Manzuik, Steve.
|
245 |
1 |
0 |
|a Network Security Assessment :
|b From Vulnerability to Patch.
|
260 |
|
|
|a Rockland :
|b Elsevier Science,
|c 2006.
|
300 |
|
|
|a 1 online resource (412 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover ; Network Security Assessment: From Vulnerability to Patch; Copyright Page ; Contents ; Foreword; Chapter 1. Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Vulnerability Assessment 101; Introduction; What is a Vulnerability Assessment?; Seeking Out Vulnerabilities; Detecting Vulnerabilities via Security Technologies; The Importance of Seeking Out Vulnerabilities Looking Closer at the Numbers; Summary; Solutions Fast Track.
|
505 |
8 |
|
|a Frequently Asked QuestionsChapter 3. Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerability Assessment: Step One; Introduction; Know Your Network; Classifying Your Assets; I Thought This Was a Vulnerability Assessment Chapter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Vulnerability Assessment: Step Two; Introduction; An Effective Scanning Program; Scanning Your Network; When to Scan; Summary.
|
505 |
8 |
|
|a Solutions Fast TrackFrequently Asked Questions; Chapter 6. Going Further; Introduction; Types of Penetration Tests; Scenario: An Internal Network Attack; Penetration Testing; Vulnerability Assessment versus a Penetration Test; Internal versus External; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Vulnerability Management; Introduction; The Vulnerability Management Plan; The Six Stages of Vulnerability Management; Governance (What the Auditors Want to Know); Measuring the Performance of a Vulnerability Management Program; Common Problems with Vulnerability Management.
|
520 |
|
|
|a Solutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerability Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Vulnerability and Configuration Management; Introduction; What is Vulnerability Management?; Patch Management; Building a Patch Test Lab; Patch Distribution and Deployment; Configuration Management; Summary.
|
505 |
8 |
|
|a Solutions Fast TrackFrequently Asked Questions; Chapter 10. Regulatory Compliance; Introduction; Regulating Assessments and Pen Tests; Drafting an Information Security Program; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Tying It All Together; Introduction; A Vulnerability Management Methodology; Step One: Know Your Assets; Step Two: Categorize Your Assets; Step Three: Create a Baseline Scan of Assets; Step Four: Perform a Penetration Test on Certain Assets; Step Five: Remediate Vulnerabilities and Risk; Step Six: Create a Vulnerability Assessment Schedule.
|
500 |
|
|
|a Step Seven: Create a Patch and Change Management Process.
|
520 |
|
|
|a This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detail.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Evaluation
|x Methodology.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation
|x Méthodologie.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Pfeil, Ken.
|
700 |
1 |
|
|a Gold, Andrew.
|
758 |
|
|
|i has work:
|a Network security assessment (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGJp3h8VPcpKtyFY976f4m
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Manzuik, Steve.
|t Network Security Assessment: From Vulnerability to Patch.
|d Rockland : Elsevier Science, ©2006
|z 9781597491013
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=280219
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL280219
|
994 |
|
|
|a 92
|b IZTAP
|