Narrow Search
Search narrowed by
Last searches

Results for *

Displaying results 1 to 2 of 2.

  1. Vulnerability Management
    Published: 2019
    Publisher:  Auerbach Publications, Milton ; O'Reilly Media Inc., Sebastopol, CA

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a... more

    Access:
    Bibliothek der Hochschule Darmstadt, Zentralbibliothek
    No inter-library loan
    Universitätsbibliothek J. C. Senckenberg, Zentralbibliothek (ZB)
    No inter-library loan
    Bibliothek der Hochschule Mainz, Untergeschoss
    No inter-library loan
    Universität Marburg, Universitätsbibliothek
    No inter-library loan

     

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1000011933; 9781000011937; 1000005097; 9781000005097; 0415015464; 9780415015462; 0429289650; 9780429289651
    RVK Categories: EC 1850 ; EC 1874 ; EC 2220 ; EC 2230 ; HM 1331 ; HN 1331
    Edition: 2nd ed
    Subjects: Frau; Frauenroman; Englisch; Frauenliteratur; Schriftstellerin; Weiblichkeit; Postmoderne; Ästhetik; Literatur; Information technology; Computer security; Computer security; Information technology
    Other subjects: Woolf, Virginia (1882-1941); Woolf, Virginia (1882-1941)
    Scope: 1 Online-Ressource (330 pages)
    Notes:

    Description based upon print version of record

  2. Vulnerability management
    Published: 2019
    Publisher:  CRC Press, impring of Taylor & Francis Group, Boca Raton, FL ; Taylor & Francis Group, London

    Access:
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9780415015189; 0415015189; 9780429289651; 0429289650; 9780367235147; 0367235145; 9781000005097; 1000005097
    RVK Categories: EC 5250
    Edition: Second edition
    Subjects: Literaturkritik; Feminismus; Computer security; Information technology; Risk management
    Scope: 1 Online-Ressource
    Notes:

    Includes index