Vulnerability Management.

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek t...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2019
Edition:2nd ed.
Language:English
Physical Description:1 online resource (330 pages)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603453804498
ctrlnum (CKB)4100000008339379
(MiAaPQ)EBC5781400
(OCoLC)1104079230
(OCoLC-P)1104079230
(FlBoTFG)9780429289651
(OCoLC)1317380424
(OCoLC-P)1317380424
(CaSebORM)9781000011937
(EXLCZ)994100000008339379
collection bib_alma
record_format marc
spelling Foreman, Park.
Vulnerability Management.
2nd ed.
Milton : Auerbach Publications, 2019.
1 online resource (330 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on print version record.
Description based upon print version of record.
The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Information technology Security measures.
Computer security.
Woolf, Virginia, 1882-1941 Criticism and interpretation.
1-03-240143-5
0-367-23514-5
language English
format eBook
author Foreman, Park.
spellingShingle Foreman, Park.
Vulnerability Management.
The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
author_facet Foreman, Park.
author_variant p f pf
author_sort Foreman, Park.
title Vulnerability Management.
title_full Vulnerability Management.
title_fullStr Vulnerability Management.
title_full_unstemmed Vulnerability Management.
title_auth Vulnerability Management.
title_new Vulnerability Management.
title_sort vulnerability management.
publisher Auerbach Publications,
publishDate 2019
physical 1 online resource (330 pages)
edition 2nd ed.
contents The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.
isbn 1-000-01193-3
1-000-00509-7
0-415-01546-4
0-429-28965-0
1-03-240143-5
0-367-23514-5
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 F674 42019
era_facet 1882-1941
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
600 - Technology
dewey-tens 000 - Computer science, knowledge & systems
650 - Management & public relations
dewey-ones 005 - Computer programming, programs & data
658 - General management
dewey-full 005.8
658.478
dewey-sort 15.8
dewey-raw 005.8
658.478
dewey-search 005.8
658.478
oclc_num 1104079230
1317380424
work_keys_str_mv AT foremanpark vulnerabilitymanagement
status_str c
ids_txt_mv (CKB)4100000008339379
(MiAaPQ)EBC5781400
(OCoLC)1104079230
(OCoLC-P)1104079230
(FlBoTFG)9780429289651
(OCoLC)1317380424
(OCoLC-P)1317380424
(CaSebORM)9781000011937
(EXLCZ)994100000008339379
carrierType_str_mv cr
is_hierarchy_title Vulnerability Management.
_version_ 1804707977237626880
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01416cam a2200397Mu 4500</leader><controlfield tag="001">993603453804498</controlfield><controlfield tag="005">20190620101716.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190615s2019 xx o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-000-01193-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-000-00509-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-415-01546-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-28965-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000008339379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5781400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104079230</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1104079230</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429289651</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1317380424</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1317380424</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaSebORM)9781000011937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000008339379</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.F674 2019</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1=" " ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Foreman, Park.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Vulnerability Management.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Milton :</subfield><subfield code="b">Auerbach Publications,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (330 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The vulnerability experience -- Program and organization -- Technology -- Selecting technology -- Process -- Execution, reporting, and analysis -- Planning -- Strategic vulnerabilities -- Managing vulnerabilities in the cloud.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="600" ind1="1" ind2="0"><subfield code="a">Woolf, Virginia,</subfield><subfield code="d">1882-1941</subfield><subfield code="x">Criticism and interpretation.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-03-240143-5</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-367-23514-5</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-07-16 05:42:00 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-06-08 22:26:08 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338363810004498&amp;Force_direct=true</subfield><subfield code="Z">5338363810004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338363810004498</subfield></datafield></record></collection>