WHY THIS BOOK?
Although the practice of using automated tools to help perform effective risk management is not new, it is an exciting and dynamic field of study. The data exchange protocols we describe in this book grew out of the work of many engineers who foresaw a “better way” of learning and sharing information about security risks, collaborating about the best way to mitigate those risks, and reporting on the residual risk that comes with operating an information system in the real world.
This book collects much of the information about those standards that is currently scattered. It provides a convenient description of the benefits and practical use of security automation protocols.
WHO SHOULD READ THIS BOOK
This book is written ...