Asset attack vectors building effective vulnerability management strategies to protect organizations

Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Haber, Morey J. (VerfasserIn)
Weitere Verfasser: Hibbert, Brad (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Berkeley, CA] Apress 2018
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-04760817X
003 DE-627-1
005 20240228120520.0
007 cr uuu---uuuuu
008 191023s2018 xx |||||o 00| ||eng c
020 |a 9781484236277  |c electronic bk.  |9 978-1-4842-3627-7 
020 |a 1484236270  |c electronic bk.  |9 1-4842-3627-0 
020 |a 1484236262  |9 1-4842-3626-2 
020 |a 9781484236260  |9 978-1-4842-3626-0 
035 |a (DE-627-1)04760817X 
035 |a (DE-599)KEP04760817X 
035 |a (ORHE)9781484236277 
035 |a (DE-627-1)04760817X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
072 7 |a UR  |2 bicssc 
082 0 |a 005.8  |2 23 
100 1 |a Haber, Morey J.  |e VerfasserIn  |4 aut 
245 1 0 |a Asset attack vectors  |b building effective vulnerability management strategies to protect organizations  |c Morey J. Haber, Brad Hibbert 
264 1 |a [Berkeley, CA]  |b Apress  |c 2018 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from PDF title page (EBSCO, viewed June 20, 2018) 
520 |a Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls. 
650 0 |a Computer security 
650 2 |a Computer Security 
650 4 |a Sécurité informatique 
650 4 |a COMPUTERS ; Security ; General 
650 4 |a Computer security 
700 1 |a Hibbert, Brad  |e MitwirkendeR  |4 ctb 
776 1 |z 9781484236260 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781484236260 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781484236277/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-04760817X
_version_ 1818767307802935296
adam_text
any_adam_object
author Haber, Morey J.
author2 Hibbert, Brad
author2_role ctb
author2_variant b h bh
author_facet Haber, Morey J.
Hibbert, Brad
author_role aut
author_sort Haber, Morey J.
author_variant m j h mj mjh
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)04760817X
(DE-599)KEP04760817X
(ORHE)9781484236277
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03708cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-04760817X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120520.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484236277</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-3627-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484236270</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-3627-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484236262</subfield><subfield code="9">1-4842-3626-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484236260</subfield><subfield code="9">978-1-4842-3626-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04760817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04760817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484236277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04760817X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haber, Morey J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Asset attack vectors</subfield><subfield code="b">building effective vulnerability management strategies to protect organizations</subfield><subfield code="c">Morey J. Haber, Brad Hibbert</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, CA]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed June 20, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hibbert, Brad</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484236260</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484236260</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484236277/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-04760817X
illustrated Not Illustrated
indexdate 2024-12-18T08:47:48Z
institution BVB
isbn 9781484236277
1484236270
1484236262
9781484236260
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Apress
record_format marc
spelling Haber, Morey J. VerfasserIn aut
Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert
[Berkeley, CA] Apress 2018
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from PDF title page (EBSCO, viewed June 20, 2018)
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls.
Computer security
Computer Security
Sécurité informatique
COMPUTERS ; Security ; General
Hibbert, Brad MitwirkendeR ctb
9781484236260
Erscheint auch als Druck-Ausgabe 9781484236260
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484236277/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Haber, Morey J.
Asset attack vectors building effective vulnerability management strategies to protect organizations
Computer security
Computer Security
Sécurité informatique
COMPUTERS ; Security ; General
title Asset attack vectors building effective vulnerability management strategies to protect organizations
title_auth Asset attack vectors building effective vulnerability management strategies to protect organizations
title_exact_search Asset attack vectors building effective vulnerability management strategies to protect organizations
title_full Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert
title_fullStr Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert
title_full_unstemmed Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert
title_short Asset attack vectors
title_sort asset attack vectors building effective vulnerability management strategies to protect organizations
title_sub building effective vulnerability management strategies to protect organizations
topic Computer security
Computer Security
Sécurité informatique
COMPUTERS ; Security ; General
topic_facet Computer security
Computer Security
Sécurité informatique
COMPUTERS ; Security ; General
url https://learning.oreilly.com/library/view/-/9781484236277/?ar
work_keys_str_mv AT habermoreyj assetattackvectorsbuildingeffectivevulnerabilitymanagementstrategiestoprotectorganizations
AT hibbertbrad assetattackvectorsbuildingeffectivevulnerabilitymanagementstrategiestoprotectorganizations