Inicio > > Seguridad informática > Vulnerability Management
Vulnerability Management

Vulnerability Management

NoContributor

79,58 €
IVA incluido
Disponible
Editorial:
Taylor & Francis Ltd
Año de edición:
2022
Materia
Seguridad informática
ISBN:
9781032401430
79,58 €
IVA incluido
Disponible
Añadir a favoritos

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means.Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper’s perspective.This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
    Disponible

    258,62 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    73,25 €

  • A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem
    V S Saranya
    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet con...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Blockchain Beyond Bitcoin
    Edward Franklin
    Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as smart contracts, decentralized applications, digital identity, supply chain, voting, and more. Learn how blockchain works, why it matters, and how to use it for various purposes and industries. ...
    Disponible

    103,11 €

Otros libros del autor

  • The Dravidian Languages
    NoContributor
    The Dravidian language family is the world’s fourth largest with nearly 250 million speakers across South Asia from Pakistan to Nepal, from Bangladesh to Sri Lanka. This authoritative reference source provides a unique description of the languages, covering their grammatical structure and historical development, plus sociolinguistic features. Each chapter combines a modern ling...
    Disponible

    77,16 €

  • Leading the eLearning Transformation of Higher Education
    NoContributor
    Published in Association with eLearning has entered the mainstream of higher education as an agent of strategic change. This transformation requires eLearning leaders to develop the skills to innovate successfully at a time of heightened competition and rapid technological change.In this environment eLearning leaders must act within their institutions as much more than technolo...
    Disponible

    56,47 €

  • A Tenth-Century Byzantine Military Manual
    NoContributor
    The Sylloge Tacticorum is a mid-Byzantine example of the literary genre of military manuals or Taktika which stretches back to antiquity. It was one of a number produced during the tenth century CE, a period when the Byzantine empire enjoyed a large measure of success in its wars against its traditional enemy, the Arabs. Compiled to record and preserve military strategies, know...
    Disponible

    73,52 €

  • Polymer and Composite Rheology
    NoContributor
    An analysis of polymer and composite rheology. This second edition covers flow properties of thermoplastic and thermoset polymers, and general principles and applications of all phases of polymer rheology, with new chapters on the rheology of particulate and fibre composites. It also includes new and expanded detail on polymer blends and emulsions, foams, reacting systems, and ...
    Disponible

    110,35 €

  • Trade Policy, Protectionism and the Third World
    NoContributor
    The 1980s saw an alarming revival of protectionism among Western countries, as a result of a decade of persistent economic crises, slow growth, industrial decline and rising unemployment. The two major actors, the US and the European Community, between them bore the major responsibility for the breakdown of the liberal world trading system. Protection in the 1970s and 1980s too...
    Disponible

    60,04 €

  • The Stock Exchange
    NoContributor
    The Stock Exchange has been described as the mart of the world; as the nerve-centre of the politics and finances of nations; as the barometer of their prosperity and adversity; and as the bottomless pit of London, worse than all the hells. This book, first published in 1904, examines the London Stock Exchange in its purest sense, as the market for stocks and shares. ...
    Disponible

    66,98 €