Vulnerability Management
Autor Park Foremanen Limba Engleză Hardback – 25 iun 2019
Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective.
This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 259.99 lei 6-8 săpt. | |
CRC Press – 29 aug 2022 | 259.99 lei 6-8 săpt. | |
Hardback (1) | 619.72 lei 6-8 săpt. | |
CRC Press – 25 iun 2019 | 619.72 lei 6-8 săpt. |
Preț: 619.72 lei
Preț vechi: 900.59 lei
-31% Nou
Puncte Express: 930
Preț estimativ în valută:
118.60€ • 123.20$ • 98.52£
118.60€ • 123.20$ • 98.52£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367235147
ISBN-10: 0367235145
Pagini: 330
Ilustrații: 11 Tables, black and white
Dimensiuni: 156 x 234 x 25 mm
Greutate: 0.63 kg
Ediția:2 New edition
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0367235145
Pagini: 330
Ilustrații: 11 Tables, black and white
Dimensiuni: 156 x 234 x 25 mm
Greutate: 0.63 kg
Ediția:2 New edition
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Preface
Acknowledgments
About the Author
1 Introduction
2 The Vulnerability Experience
3 Program and Organization
4 Technology
5 Selecting Technology
6 Process
7 Execution, Reporting, and Analysis
8 Planning
9 Strategic Vulnerabilities
10 Managing Vulnerabilities in the Cloud
11 Summary and the Future
Index
Acknowledgments
About the Author
1 Introduction
2 The Vulnerability Experience
3 Program and Organization
4 Technology
5 Selecting Technology
6 Process
7 Execution, Reporting, and Analysis
8 Planning
9 Strategic Vulnerabilities
10 Managing Vulnerabilities in the Cloud
11 Summary and the Future
Index
Notă biografică
Park Foreman is a Security and Compliance Architect at IBM Cloud Brokerage Services where he designs security controls supporting customers in their migration journey to cloud services. He is a recognized expert in vulnerability management, incident management and cyber security strategy. Park holds a Master of Science degree in information security and assurance and CISSP-ISSAP certification among others. Originally starting his information security experience in college working on operating system kernel security design, he went on to work in application security at Bell Labs and network security in the banking and telecommunications industries. In addition to first and second edition of this book, Park has also published articles in the ISSA Journal and presented at security conferences. At IBM, Park continues to work across business units on developing new technologies and methods to secure cloud services and applications.
Descriere
Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps