Practical Vulnerability Management. A Strategic Approach to Managing Cyber Risk

Par : Andrew Magnusson
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • Nombre de pages192
  • FormatePub
  • ISBN978-1-59327-989-9
  • EAN9781593279899
  • Date de parution29/09/2020
  • Protection num.pas de protection
  • Taille17 Mo
  • Infos supplémentairesepub
  • ÉditeurNo Starch Press

Résumé

Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities. Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do.
Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose. The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software.
Along the way, you'll learn how to:  .  Generate accurate and usable vulnerability intelligence  .  Scan your networked systems to identify and assess bugs and vulnerabilities  .  Prioritize and respond to various security risks  .  Automate scans, data analysis, reporting, and other repetitive tasks  .  Customize the provided scripts to adapt them to your own needsPlaying whack-a-bug won't cut it against today's advanced adversaries.
Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.
Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks. Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities. Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do.
Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose. The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software.
Along the way, you'll learn how to:  .  Generate accurate and usable vulnerability intelligence  .  Scan your networked systems to identify and assess bugs and vulnerabilities  .  Prioritize and respond to various security risks  .  Automate scans, data analysis, reporting, and other repetitive tasks  .  Customize the provided scripts to adapt them to your own needsPlaying whack-a-bug won't cut it against today's advanced adversaries.
Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.