Author : Kevin Roebuck
Publisher : Tebbo
ISBN 13 : 9781743045800
Total Pages : 768 pages
Book Rating : 4.0/5 (458 download)
Book Synopsis Vulnerability Management: High-impact Strategies - What You Need to Know by : Kevin Roebuck
Download or read book Vulnerability Management: High-impact Strategies - What You Need to Know written by Kevin Roebuck and published by Tebbo. This book was released on 2011 with total page 768 pages. Available in PDF, EPUB and Kindle. Book excerpt: Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing systems. This book is your ultimate resource for Vulnerability Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Vulnerability Management right away, covering: Vulnerability management, AAA protocol, Information technology security audit, Automated information systems security, Canary trap, CBL Index, CESG Claims Tested Mark, Chroot, Commercial Product Assurance, Common Criteria Testing Laboratory, Composite Blocking List, Computer forensics, Computer security policy, Computer Underground Digest, Cryptographic Module Testing Laboratory, Control system security, Cyber security standards, Cyber spying, Cyber-security regulation, Defense in depth (computing), Department of Defense Information Assurance Certification and Accreditation Process, Department of Defense Information Technology Security Certification and Accreditation Process, Differentiated security, DShield, Dynablock, Enterprise Privacy Authorization Language, Evaluation Assurance Level, Exit procedure, Filesystem permissions, Full disclosure, Fuzz testing, Google hacking, Hardening (computing), Host protected area, Identity management, Internet ethics, Intruder detection, Labeled Security Protection Profile, Erik Laykin, Mobile device forensics, MyNetWatchman, National Information Assurance Certification and Accreditation Process, National Information Assurance Training and Education Center, National Strategy to Secure Cyberspace, Need to know, Network security policy, Not Just Another Bogus List, Off-site data protection, Open Vulnerability and Assessment Language, Patch Tuesday, Penetration test, Presumed security, Privilege revocation, Privilege separation, Protection mechanism, Protection Profile, Responsible disclosure, RISKS Digest, Same origin policy, Schneier's Law, Secure attention key, Secure by default, Secure error messages in software systems, Security controls, Security management, Security Target, Security through obscurity, Security-evaluated operating system, Setuid, Shibboleth (computer security), Software forensics, System High Mode, System Security Authorization Agreement, Trust negotiation, Trusted computing base, XACML, XTS-400, 201 CMR 17.00, Asset (computer security), Attack (computer), Federal Information Security Management Act of 2002, Health Insurance Portability and Accountability Act, Information Assurance Vulnerability Alert, IT risk, IT risk management, Month of bugs, Nikto Web Scanner, North American Electric Reliability Corporation, Payment Card Industry Data Security Standard, Sarbanes-Oxley Act, Security Content Automation Protocol, Threat (computer), Vulnerability (computing), Network security, Administrative domain, AEGIS SecureConnect, Aladdin Knowledge Systems, Alert Logic, Anomaly-based intrusion detection system, Anti-pharming, Anti-phishing software, Anti-worm, Application-level gateway, ARP spoofing, Asprox botnet, Attack tree, Authentication server, Avaya Secure Network Access, Avaya VPN Router, Bagle (computer worm), Barracuda Networks, Bastion host, Black hole (networking), BLACKER, Blue Cube Security, BNC (software), Botnet, BredoLab botnet, Bro (software), Byzantine Foothold, Captive portal, Capture the flag, Check Point, Check Point Abra, Check Point VPN-1, Christmas tree packet, Cisco ASA, Cisco Global Exploiter, Cisco PIX...and much more This book explains in-depth the real drivers and workings of Vulnerability Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Vulnerability Management with the objectivity of experienced professionals.