Cargando…

Network Security Assessment : From Vulnerability to Patch.

Solutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerabi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Manzuik, Steve
Otros Autores: Pfeil, Ken, Gold, Andrew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Elsevier Science, 2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn935262202
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160123s2006 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d MERUC  |d ZCU  |d S8J  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCF  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9780080512532 
020 |a 0080512534 
029 1 |a AU@  |b 000059584929 
029 1 |a DEBBG  |b BV044121848 
035 |a (OCoLC)935262202 
050 4 |a TK5105.59 ǂb M38 2007eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Manzuik, Steve. 
245 1 0 |a Network Security Assessment :  |b From Vulnerability to Patch. 
260 |a Rockland :  |b Elsevier Science,  |c 2006. 
300 |a 1 online resource (412 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Front Cover ; Network Security Assessment: From Vulnerability to Patch; Copyright Page ; Contents ; Foreword; Chapter 1. Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Vulnerability Assessment 101; Introduction; What is a Vulnerability Assessment?; Seeking Out Vulnerabilities; Detecting Vulnerabilities via Security Technologies; The Importance of Seeking Out Vulnerabilities Looking Closer at the Numbers; Summary; Solutions Fast Track. 
505 8 |a Frequently Asked QuestionsChapter 3. Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerability Assessment: Step One; Introduction; Know Your Network; Classifying Your Assets; I Thought This Was a Vulnerability Assessment Chapter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Vulnerability Assessment: Step Two; Introduction; An Effective Scanning Program; Scanning Your Network; When to Scan; Summary. 
505 8 |a Solutions Fast TrackFrequently Asked Questions; Chapter 6. Going Further; Introduction; Types of Penetration Tests; Scenario: An Internal Network Attack; Penetration Testing; Vulnerability Assessment versus a Penetration Test; Internal versus External; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Vulnerability Management; Introduction; The Vulnerability Management Plan; The Six Stages of Vulnerability Management; Governance (What the Auditors Want to Know); Measuring the Performance of a Vulnerability Management Program; Common Problems with Vulnerability Management. 
520 |a Solutions Fast Track; Frequently Asked Questions; Chapter 8. Vulnerability Management Tools; Introduction; The Perfect Tool in a Perfect World; Evaluating Vulnerability Management Tools; Commercial Vulnerability Management Tools; Open Source and Free Vulnerability Management Tools; Managed Vulnerability Services; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Vulnerability and Configuration Management; Introduction; What is Vulnerability Management?; Patch Management; Building a Patch Test Lab; Patch Distribution and Deployment; Configuration Management; Summary. 
505 8 |a Solutions Fast TrackFrequently Asked Questions; Chapter 10. Regulatory Compliance; Introduction; Regulating Assessments and Pen Tests; Drafting an Information Security Program; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Tying It All Together; Introduction; A Vulnerability Management Methodology; Step One: Know Your Assets; Step Two: Categorize Your Assets; Step Three: Create a Baseline Scan of Assets; Step Four: Perform a Penetration Test on Certain Assets; Step Five: Remediate Vulnerabilities and Risk; Step Six: Create a Vulnerability Assessment Schedule. 
500 |a Step Seven: Create a Patch and Change Management Process. 
520 |a This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detail. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security  |x Evaluation  |x Methodology. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Évaluation  |x Méthodologie. 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Pfeil, Ken. 
700 1 |a Gold, Andrew. 
758 |i has work:  |a Network security assessment (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGJp3h8VPcpKtyFY976f4m  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Manzuik, Steve.  |t Network Security Assessment: From Vulnerability to Patch.  |d Rockland : Elsevier Science, ©2006  |z 9781597491013 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=280219  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL280219 
994 |a 92  |b IZTAP