Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
How Security cHangeD PoSt 2000 105
network to divert trac between networks). In Q we knew nothing of
the security posture of the other connected corporate networks (OK,
well Q had asked a service provider to do penetration tests of the other
rms’ networks—but personally I was not going to rely on the output
of these tests), and with this in mind, the vulnerability management
side of things in Q had to be improved. So with management support,
I had a mandate to lead the new vulnerability management approach
that would involve a combination of remote and local/scripted tests—
with the depth of analysis dependent on the criticality/exposure of the
hosting device.
e proper way to carry out a vulnerability assessment program
is with a platform ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355