Managing a network vulnerability assessment

This book provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Peltier, Thomas R. (VerfasserIn), Peltier, Justin (VerfasserIn), Blackley, John A. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton, Fla. Auerbach Publications 2003
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This book provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this g.
Beschreibung:Title from title screen. - Includes bibliographical references and index
Beschreibung:1 online resource (xiii, 291 pages) illustrations
ISBN:020350304X
9780203503041
9780849312700
0849312701
9780429210747
0429210744
9781135512972
1135512973