Cantitate/Preț
Produs

Vulnerability Management

Autor Park Foreman
en Limba Engleză Hardback – 25 iun 2019
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means.
Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective.
This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 25999 lei  6-8 săpt.
  CRC Press – 29 aug 2022 25999 lei  6-8 săpt.
Hardback (1) 61972 lei  6-8 săpt.
  CRC Press – 25 iun 2019 61972 lei  6-8 săpt.

Preț: 61972 lei

Preț vechi: 90059 lei
-31% Nou

Puncte Express: 930

Preț estimativ în valută:
11860 12320$ 9852£

Carte tipărită la comandă

Livrare economică 01-15 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780367235147
ISBN-10: 0367235145
Pagini: 330
Ilustrații: 11 Tables, black and white
Dimensiuni: 156 x 234 x 25 mm
Greutate: 0.63 kg
Ediția:2 New edition
Editura: CRC Press
Colecția Auerbach Publications

Public țintă

Academic and Professional Practice & Development

Cuprins

Preface
Acknowledgments
About the Author
1 Introduction
2 The Vulnerability Experience
3 Program and Organization
4 Technology
5 Selecting Technology
6 Process
7 Execution, Reporting, and Analysis
8 Planning
9 Strategic Vulnerabilities
10 Managing Vulnerabilities in the Cloud
11 Summary and the Future
Index

Notă biografică

Park Foreman is a Security and Compliance Architect at IBM Cloud Brokerage Services where he designs security controls supporting customers in their migration journey to cloud services. He is a recognized expert in vulnerability management, incident management and cyber security strategy. Park holds a Master of Science degree in information security and assurance and CISSP-ISSAP certification among others. Originally starting his information security experience in college working on operating system kernel security design, he went on to work in application security at Bell Labs and network security in the banking and telecommunications industries. In addition to first and second edition of this book, Park has also published articles in the ISSA Journal and presented at security conferences. At IBM, Park continues to work across business units on developing new technologies and methods to secure cloud services and applications.

Descriere

Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps