Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
Schlagwörter
  • 1
    Online-Ressource
    Online-Ressource
    Milton :Auerbach Publications,
    UID:
    almahu_9949383409702882
    Umfang: 1 online resource (330 pages)
    Ausgabe: 2nd ed.
    ISBN: 9781000005097 , 1000005097 , 9781000011937 , 1000011933 , 0415015464 , 9780415015462 , 0429289650 , 9780429289651
    Weitere Ausg.: Print version: Foreman, Park. Vulnerability Management, Second Edition. Milton : Auerbach Publications, ©2019 ISBN 9780367235147
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Milton :Auerbach Publications,
    UID:
    almahu_9949507943002882
    Umfang: 1 online resource (330 pages)
    Ausgabe: 2nd ed.
    ISBN: 1-000-01193-3 , 1-000-00509-7 , 0-415-01546-4 , 0-429-28965-0
    Inhalt: Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
    Anmerkung: Description based upon print version of record. , The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
    Weitere Ausg.: ISBN 1-03-240143-5
    Weitere Ausg.: ISBN 0-367-23514-5
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Milton :Auerbach Publications,
    UID:
    edoccha_9961125582302883
    Umfang: 1 online resource (330 pages)
    Ausgabe: 2nd ed.
    ISBN: 1-000-01193-3 , 1-000-00509-7 , 0-415-01546-4 , 0-429-28965-0
    Inhalt: Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
    Anmerkung: Description based upon print version of record. , The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
    Weitere Ausg.: ISBN 1-03-240143-5
    Weitere Ausg.: ISBN 0-367-23514-5
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Milton :Auerbach Publications,
    UID:
    edocfu_9961125582302883
    Umfang: 1 online resource (330 pages)
    Ausgabe: 2nd ed.
    ISBN: 1-000-01193-3 , 1-000-00509-7 , 0-415-01546-4 , 0-429-28965-0
    Inhalt: Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
    Anmerkung: Description based upon print version of record. , The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
    Weitere Ausg.: ISBN 1-03-240143-5
    Weitere Ausg.: ISBN 0-367-23514-5
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 1000011943?
Meinten Sie 1000009933?
Meinten Sie 1000010939?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz