Verwandte Artikel zu Network Security Assessment: From Vulnerability to...

Network Security Assessment: From Vulnerability to Patch - Softcover

 
9781597491013: Network Security Assessment: From Vulnerability to Patch

Inhaltsangabe

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors' time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. It is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation. It has unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system. Vulnerability management is rated the No. 2 most pressing concern for security professionals in a poll conducted by "Information Security Magazine". It covers in the detail the vulnerability management lifecycle from discovery through patch.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Gebraucht kaufen

Zustand: Gut
Supports Goodwill of Silicon Valley...
Diesen Artikel anzeigen

EUR 78,09 für den Versand von USA nach Deutschland

Versandziele, Kosten & Dauer

EUR 11,56 für den Versand von Vereinigtes Königreich nach Deutschland

Versandziele, Kosten & Dauer

Suchergebnisse für Network Security Assessment: From Vulnerability to...

Beispielbild für diese ISBN

Steve Manzuik/ Andre Gold/ Chris Gatford
Verlag: Syngress Media Inc, 2006
ISBN 10: 1597491012 ISBN 13: 9781597491013
Neu Paperback

Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Paperback. Zustand: Brand New. 1st edition. 372 pages. 8.75x7.00x1.00 inches. In Stock. Bestandsnummer des Verkäufers zk1597491012

Verkäufer kontaktieren

Neu kaufen

EUR 90,58
Währung umrechnen
Versand: EUR 11,56
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb

Foto des Verkäufers

Steve Manzuik; Andre Gold; Chris Gatford
Verlag: Syngress, 2006
ISBN 10: 1597491012 ISBN 13: 9781597491013
Gebraucht Softcover

Anbieter: Goodwill of Silicon Valley, SAN JOSE, CA, USA

Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: very_good. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in very good condition! The cover and any other included accessories are also in very good condition showing some minor use. The spine is straight, there are no rips tears or creases on the cover or the pages. Bestandsnummer des Verkäufers GWSVV.1597491012.VG

Verkäufer kontaktieren

Gebraucht kaufen

EUR 45,80
Währung umrechnen
Versand: EUR 78,09
Von USA nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb