Books+ Search Results

Vulnerability Management

Title
Vulnerability Management [electronic resource].
ISBN
1000011933
9781000011937
1000005097
9781000005097
0415015464
9780415015462
0429289650
9780429289651
0367235145
9780367235147
Edition
2nd ed.
Published
Milton : Auerbach Publications, 2019.
Physical Description
1 online resource (330 pages)
Local Notes
Access is available to the Yale community.
Notes
Description based upon print version of record.
Description based on print version record.
Access and use
Access restricted by licensing agreement.
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
Summary
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Variant and related titles
O'Reilly Safari. OCLC KB.
Other formats
Print version:
Format
Books / Online
Language
English
Added to Catalog
October 30, 2024
Contents
The vulnerability experience
Program and organization
Technology
Selecting technology
Process
Execution, reporting, and analysis
Planning
Strategic vulnerabilities
Managing vulnerabilities in the cloud.
Genre/Form
Criticism, interpretation, etc.
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?