Book description
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capaTable of contents
- Front cover (1/2)
- Front cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- Acknowledgments
- About the Author
- CHAPTER 1. INTRODUCTION (1/2)
- CHAPTER 1. INTRODUCTION (2/2)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (1/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (2/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (3/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (4/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (5/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (6/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (7/8)
- CHAPTER 2. THE VULNERABILITY EXPERIENCE (8/8)
- CHAPTER 3. PROGRAM AND ORGANIZATION (1/4)
- CHAPTER 3. PROGRAM AND ORGANIZATION (2/4)
- CHAPTER 3. PROGRAM AND ORGANIZATION (3/4)
- CHAPTER 3. PROGRAM AND ORGANIZATION (4/4)
- CHAPTER 4. TECHNOLOGY (1/17)
- CHAPTER 4. TECHNOLOGY (2/17)
- CHAPTER 4. TECHNOLOGY (3/17)
- CHAPTER 4. TECHNOLOGY (4/17)
- CHAPTER 4. TECHNOLOGY (5/17)
- CHAPTER 4. TECHNOLOGY (6/17)
- CHAPTER 4. TECHNOLOGY (7/17)
- CHAPTER 4. TECHNOLOGY (8/17)
- CHAPTER 4. TECHNOLOGY (9/17)
- CHAPTER 4. TECHNOLOGY (10/17)
- CHAPTER 4. TECHNOLOGY (11/17)
- CHAPTER 4. TECHNOLOGY (12/17)
- CHAPTER 4. TECHNOLOGY (13/17)
- CHAPTER 4. TECHNOLOGY (14/17)
- CHAPTER 4. TECHNOLOGY (15/17)
- CHAPTER 4. TECHNOLOGY (16/17)
- CHAPTER 4. TECHNOLOGY (17/17)
- CHAPTER 5. SELECTING TECHNOLOGY (1/8)
- CHAPTER 5. SELECTING TECHNOLOGY (2/8)
- CHAPTER 5. SELECTING TECHNOLOGY (3/8)
- CHAPTER 5. SELECTING TECHNOLOGY (4/8)
- CHAPTER 5. SELECTING TECHNOLOGY (5/8)
- CHAPTER 5. SELECTING TECHNOLOGY (6/8)
- CHAPTER 5. SELECTING TECHNOLOGY (7/8)
- CHAPTER 5. SELECTING TECHNOLOGY (8/8)
- CHAPTER 6. PROCESS (1/7)
- CHAPTER 6. PROCESS (2/7)
- CHAPTER 6. PROCESS (3/7)
- CHAPTER 6. PROCESS (4/7)
- CHAPTER 6. PROCESS (5/7)
- CHAPTER 6. PROCESS (6/7)
- CHAPTER 6. PROCESS (7/7)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (1/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (2/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (3/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (4/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (5/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (6/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (7/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (8/9)
- CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (9/9)
- CHAPTER 8. PLANNING (1/4)
- CHAPTER 8. PLANNING (2/4)
- CHAPTER 8. PLANNING (3/4)
- CHAPTER 8. PLANNING (4/4)
- CHAPTER 9. STRATEGIC VULNERABILITIES (1/6)
- CHAPTER 9. STRATEGIC VULNERABILITIES (2/6)
- CHAPTER 9. STRATEGIC VULNERABILITIES (3/6)
- CHAPTER 9. STRATEGIC VULNERABILITIES (4/6)
- CHAPTER 9. STRATEGIC VULNERABILITIES (5/6)
- CHAPTER 9. STRATEGIC VULNERABILITIES (6/6)
- CHAPTER 10. SUMMARY (1/4)
- CHAPTER 10. SUMMARY (2/4)
- CHAPTER 10. SUMMARY (3/4)
- CHAPTER 10. SUMMARY (4/4)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Vulnerability Management
- Author(s):
- Release date: August 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781439801512
You might also like
book
Vulnerability Management, 2nd Edition
Covering the diverse realms that chief officers need to know and the specifics applicable to singular …
book
Practical Vulnerability Management
Bugs: they’re everywhere. Software, firmware, hardware — they all have them. Bugs even live in the …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network …