Network Security Assessment: From Vulnerability to Patch
eBook - PDF

Network Security Assessment: From Vulnerability to Patch

  1. 500 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Network Security Assessment: From Vulnerability to Patch

Book details
Table of contents
Citations

About This Book

This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors' time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.* Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system* Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine* Covers in the detail the vulnerability management lifecycle from discovery through patch.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Network Security Assessment: From Vulnerability to Patch by Steve Manzuik,Ken Pfeil,Andrew Gold in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Syngress
Year
2006
ISBN
9780080512532

Table of contents

  1. Front Cover
  2. Network Security Assessment: From Vulnerability to Patch
  3. Copyright Page
  4. Contents
  5. Foreword
  6. Chapter 1. Windows of Vulnerability
  7. Chapter 2. Vulnerability Assessment 101
  8. Chapter 3. Vulnerability Assessment Tools
  9. Chapter 4. Vulnerability Assessment: Step One
  10. Chapter 5. Vulnerability Assessment: Step Two
  11. Chapter 6. Going Further
  12. Chapter 7. Vulnerability Management
  13. Chapter 8. Vulnerability Management Tools
  14. Chapter 9. Vulnerability and Configuration Management
  15. Chapter 10. Regulatory Compliance
  16. Chapter 11. Tying It All Together
  17. Appendix A. Legal Principles for Information Security Evaluations
  18. Appendix B. Examples of INFOSEC Tools by Baseline Activity
  19. Index