|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1041108964 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180619s2018 cau o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d GW5XE
|d EBLCP
|d OCLCF
|d UAB
|d UMI
|d UPM
|d STF
|d TOH
|d VT2
|d DEBBG
|d CEF
|d CNCEN
|d YOU
|d WYU
|d OTZ
|d G3B
|d LVT
|d OCLCQ
|d S9I
|d U3W
|d K6U
|d CAUOI
|d SNK
|d MERER
|d OCLCQ
|d COO
|d UKAHL
|d OCLCQ
|d UHL
|d OCLCQ
|d VLY
|d BRF
|d OCLCQ
|d OCLCO
|d COM
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1043906268
|a 1047689910
|a 1050975451
|a 1055313994
|a 1058844492
|a 1066448676
|a 1081182482
|a 1086569228
|a 1097085649
|a 1113837253
|a 1162363101
|a 1206408683
|a 1228649118
|a 1237485720
|a 1240613108
|
020 |
|
|
|a 9781484236277
|q (electronic bk.)
|
020 |
|
|
|a 1484236270
|q (electronic bk.)
|
020 |
|
|
|a 1484236262
|
020 |
|
|
|a 9781484236260
|
020 |
|
|
|z 9781484236260
|
024 |
3 |
|
|a 9781484236260
|
024 |
7 |
|
|a 10.1007/978-1-4842-3627-7
|2 doi
|
029 |
1 |
|
|a AU@
|b 000063635661
|
029 |
1 |
|
|a AU@
|b 000063679249
|
029 |
1 |
|
|a CHNEW
|b 001063555
|
029 |
1 |
|
|a CHVBK
|b 575141182
|
029 |
1 |
|
|a GBVCP
|b 1029873070
|
035 |
|
|
|a (OCoLC)1041108964
|z (OCoLC)1043906268
|z (OCoLC)1047689910
|z (OCoLC)1050975451
|z (OCoLC)1055313994
|z (OCoLC)1058844492
|z (OCoLC)1066448676
|z (OCoLC)1081182482
|z (OCoLC)1086569228
|z (OCoLC)1097085649
|z (OCoLC)1113837253
|z (OCoLC)1162363101
|z (OCoLC)1206408683
|z (OCoLC)1228649118
|z (OCoLC)1237485720
|z (OCoLC)1240613108
|
037 |
|
|
|a CL0500000978
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Haber, Morey J.
|
245 |
1 |
0 |
|a Asset attack vectors :
|b building effective vulnerability management strategies to protect organizations /
|c Morey J. Haber, Brad Hibbert.
|
264 |
|
1 |
|a [Berkeley, CA] :
|b Apress,
|c 2018.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed June 20, 2018).
|
505 |
0 |
|
|a Intro; Table of Contents; About the Authors; About the Technical Reviewer; Acknowledgments; Preface; Introduction; Chapter 1: The Attack Chain; Chapter 2: The Vulnerability Landscape; Vulnerabilities; Configurations; Exploits; False Positives; False Negatives; Malware; Social Engineering; Phishing; Curiosity Killed the Cat; Nothing Bad Will Happen; Did You Know They Removed Gullible from the Dictionary?; It Can't Happen to Me; How to Determine if Your Email Is a Phishing Attack; Ransomware; Insider Threats; External Threats; Vulnerability Disclosure; Chapter 3: Threat Intelligence.
|
505 |
8 |
|
|a Chapter 4: Credential Asset RisksChapter 5: Vulnerability Assessment; Active Vulnerability Scanning; Passive Scanners; Intrusive Vulnerability Scanning; Nonintrusive Scanning; Vulnerability Scanning Limitations and Shortcomings; Chapter 6: Configuration Assessment; Regulations; Frameworks; Benchmarks; Configuration Assessment Tools; SCAP; Chapter 7: Risk Measurement; CVE; CVSS; STIG; OVAL; IAVA; Chapter 8: Vulnerability States; Vulnerability Risk Based on State; The Three Vulnerability States; Active Vulnerabilities; Dormant Vulnerabilities; Carrier Vulnerabilities; State Prioritization.
|
505 |
8 |
|
|a Chapter 9: Vulnerability AuthoritiesChapter 10: Penetration Testing; Chapter 11: Remediation; Microsoft; Apple; Cisco; Google; Oracle; Red Hat; Adobe; Open Source; Everyone Else; Chapter 12: The Vulnerability Management Program; Design; Develop; Deploy; Operate; Maturity; Maturity Categories; Descriptions; Chapter 13: Vulnerability Management Design; Crawl, Walk, Run, Sprint; Implement for Today, But Plan for Tomorrow; It's All About Business Value; Chapter 14: Vulnerability Management Development; Vulnerability Management Scope; Operating Systems; Client Applications; Web Applications.
|
505 |
8 |
|
|a Network DevicesDatabases; Flat File Databases; Hypervisors; IaaS and PaaS; Mobile Devices; IoT; Industrial Control Systems (ICS) and SCADA; DevOps; Docker and Containers; Code Review; Tool Selection; The Vulnerability Management Process; Assessment; Measure; Remediation; Rinse and Repeat {Cycle}; End of Life; Common Vulnerability Lifecycle Mistakes; Mistake 1: Disjointed Vulnerability Management; Solution; Mistake 2: Relying on Remote Assessment Alone; Solution; Mistake 3: Unprotected Zero-Day Vulnerabilities; Solution; Mistake 4: Decentralized Visibility; Solution.
|
505 |
8 |
|
|a Mistake 5: Compliance at the Expense of SecuritySolution; Common Challenges; Aging Infrastructure; Depth and Breadth of the Program; Building the Plan; Step 1: What to Assess?; Step 2: Assessment Configuration; Step 3: Assessment Frequency; Step 4: Establish Ownership; Step 5: Data and Risk Prioritization; Step 6: Reporting; Step 7: Remediation Management; Step 8: Verification and Measurements; Step 9: Third-Party Integration; Chapter 15: Vulnerability Management Deployment; Approach 1: Critical and High-Risk Vulnerabilities Only; Approach 2: Statistical Sampling.
|
520 |
|
|
|a Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Hibbert, Brad.
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484236260
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484236277/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35093490
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5430900
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1833754
|
994 |
|
|
|a 92
|b IZTAP
|