Asset attack vectors building effective vulnerability management strategies to protect organizations
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to th...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Berkeley, CA]
Apress
2018
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04760817X | ||
003 | DE-627-1 | ||
005 | 20240228120520.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781484236277 |c electronic bk. |9 978-1-4842-3627-7 | ||
020 | |a 1484236270 |c electronic bk. |9 1-4842-3627-0 | ||
020 | |a 1484236262 |9 1-4842-3626-2 | ||
020 | |a 9781484236260 |9 978-1-4842-3626-0 | ||
035 | |a (DE-627-1)04760817X | ||
035 | |a (DE-599)KEP04760817X | ||
035 | |a (ORHE)9781484236277 | ||
035 | |a (DE-627-1)04760817X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Haber, Morey J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Asset attack vectors |b building effective vulnerability management strategies to protect organizations |c Morey J. Haber, Brad Hibbert |
264 | 1 | |a [Berkeley, CA] |b Apress |c 2018 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from PDF title page (EBSCO, viewed June 20, 2018) | ||
520 | |a Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls. | ||
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
700 | 1 | |a Hibbert, Brad |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781484236260 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484236260 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484236277/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04760817X |
---|---|
_version_ | 1818767307802935296 |
adam_text | |
any_adam_object | |
author | Haber, Morey J. |
author2 | Hibbert, Brad |
author2_role | ctb |
author2_variant | b h bh |
author_facet | Haber, Morey J. Hibbert, Brad |
author_role | aut |
author_sort | Haber, Morey J. |
author_variant | m j h mj mjh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04760817X (DE-599)KEP04760817X (ORHE)9781484236277 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03708cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-04760817X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120520.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484236277</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-3627-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484236270</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-3627-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484236262</subfield><subfield code="9">1-4842-3626-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484236260</subfield><subfield code="9">978-1-4842-3626-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04760817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04760817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484236277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04760817X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haber, Morey J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Asset attack vectors</subfield><subfield code="b">building effective vulnerability management strategies to protect organizations</subfield><subfield code="c">Morey J. Haber, Brad Hibbert</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, CA]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed June 20, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hibbert, Brad</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484236260</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484236260</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484236277/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04760817X |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:48Z |
institution | BVB |
isbn | 9781484236277 1484236270 1484236262 9781484236260 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Haber, Morey J. VerfasserIn aut Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert [Berkeley, CA] Apress 2018 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from PDF title page (EBSCO, viewed June 20, 2018) Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls. Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General Hibbert, Brad MitwirkendeR ctb 9781484236260 Erscheint auch als Druck-Ausgabe 9781484236260 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484236277/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Haber, Morey J. Asset attack vectors building effective vulnerability management strategies to protect organizations Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
title | Asset attack vectors building effective vulnerability management strategies to protect organizations |
title_auth | Asset attack vectors building effective vulnerability management strategies to protect organizations |
title_exact_search | Asset attack vectors building effective vulnerability management strategies to protect organizations |
title_full | Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert |
title_fullStr | Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert |
title_full_unstemmed | Asset attack vectors building effective vulnerability management strategies to protect organizations Morey J. Haber, Brad Hibbert |
title_short | Asset attack vectors |
title_sort | asset attack vectors building effective vulnerability management strategies to protect organizations |
title_sub | building effective vulnerability management strategies to protect organizations |
topic | Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
topic_facet | Computer security Computer Security Sécurité informatique COMPUTERS ; Security ; General |
url | https://learning.oreilly.com/library/view/-/9781484236277/?ar |
work_keys_str_mv | AT habermoreyj assetattackvectorsbuildingeffectivevulnerabilitymanagementstrategiestoprotectorganizations AT hibbertbrad assetattackvectorsbuildingeffectivevulnerabilitymanagementstrategiestoprotectorganizations |