Cargando…

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Foreman, Park
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Milton : Auerbach Publications, 2019.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1317380424
003 OCoLC
005 20231017213018.0
006 m d
007 cr cnu---unuuu
008 190615s2019 xx o 000 0 eng d
040 |a SFB  |b eng  |c SFB  |d OCLCF  |d OCLCQ  |d SFB  |d ORMDA  |d OCLCO 
020 |a 1000011933 
020 |a 9781000011937 
020 |a 1000005097 
020 |a 9781000005097 
020 |a 0415015464 
020 |a 9780415015462 
020 |a 0429289650 
020 |a 9780429289651 
035 |a (OCoLC)1317380424 
037 |a 9781000011937  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b .F674 2019 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Foreman, Park. 
245 1 0 |a Vulnerability Management  |h [electronic resource]. 
250 |a 2nd ed. 
260 |a Milton :  |b Auerbach Publications,  |c 2019. 
300 |a 1 online resource (330 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on print version record. 
500 |a Description based upon print version of record. 
505 0 |a The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud. 
520 |a Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
600 1 0 |a Woolf, Virginia,  |d 1882-1941  |x Criticism and interpretation. 
600 1 7 |a Woolf, Virginia,  |d 1882-1941  |2 fast 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
655 7 |a Criticism, interpretation, etc.  |2 fast 
776 0 8 |i Print version:  |z 0367235145 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781000011937/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP