Hackers about hacking techniques in our IT Security Magazine

VULNERABILITY MANAGEMENT

Version
Categories
Download7
Size0.00 KB
Create DateAugust 28, 2014
Last UpdatedAugust 28, 2014
Play List

Vulnerability Management
By Park Foreman
August 2009
Publisher: CRC Press
http://www.crcpress.com/product/isbn/9781439801505

50% DISCOUNT for Hakin9 SUBSCRIBERS!!!

To save 50% enter given below discount code, during checkout at www.crcpress.com.
Discount code: 392DP

Description

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capacity for quick system-wide response, current emphasis needs to be placed on maintaining the integrity of IT applications, so critical to the real and the virtual infrastructure and productivity of any community or business entity.

Written by international security consultant Park Foreman, Vulnerability Management demonstrates a proactive approach. Illustrated with examples drawn from more than two decades of multinational experience, Foreman demonstrates how much easier it is to manage potential weaknesses, than to clean up after a violation. Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Providing a fundamental understanding of technology risks from an interloper’s perspective, this efficiently organized work:

  • Offers the guidance you need to develop and personalize your own VM management program
  • Goes far beyond the obvious to cover those areas often neglected, as well as those that are actually less secure than they might appear
  • Demonstrates a host of proven methods to assess and reduce the potential for exploitation from within and without
  • Provides detailed checklists used by the author

Excerpt can be found here:http://www.infosectoday.com/Articles/Intro_Vulnerability_Management.htm

August 28, 2014

0 Responses on VULNERABILITY MANAGEMENT"

Add Comment Register



Leave a Message

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>