Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
272 ◾  Information Security Management Handbook
invulnerable to this specific attack. Additionally, since systems visible to the Internet may be a more
accessible target, security analysts can refine their search to only those specific systems. e result is
a list of systems which are potentially vulnerable to an exploit and which may require attention. If
the enterprise must conduct a vulnerability assessment of the systems, an exploit may have already
occurred, costing the enterprise in financial, productivity, and potentially reputation losses.
While many security professionals conduct cursory assessment of their environment based
upon what they know of the configuration, the real solution and implementation of predictive
vulnerability asse
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467