Vulnerability Management

Book description

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capa

Table of contents

  1. Front cover (1/2)
  2. Front cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. Acknowledgments
  7. About the Author
  8. CHAPTER 1. INTRODUCTION (1/2)
  9. CHAPTER 1. INTRODUCTION (2/2)
  10. CHAPTER 2. THE VULNERABILITY EXPERIENCE (1/8)
  11. CHAPTER 2. THE VULNERABILITY EXPERIENCE (2/8)
  12. CHAPTER 2. THE VULNERABILITY EXPERIENCE (3/8)
  13. CHAPTER 2. THE VULNERABILITY EXPERIENCE (4/8)
  14. CHAPTER 2. THE VULNERABILITY EXPERIENCE (5/8)
  15. CHAPTER 2. THE VULNERABILITY EXPERIENCE (6/8)
  16. CHAPTER 2. THE VULNERABILITY EXPERIENCE (7/8)
  17. CHAPTER 2. THE VULNERABILITY EXPERIENCE (8/8)
  18. CHAPTER 3. PROGRAM AND ORGANIZATION (1/4)
  19. CHAPTER 3. PROGRAM AND ORGANIZATION (2/4)
  20. CHAPTER 3. PROGRAM AND ORGANIZATION (3/4)
  21. CHAPTER 3. PROGRAM AND ORGANIZATION (4/4)
  22. CHAPTER 4. TECHNOLOGY (1/17)
  23. CHAPTER 4. TECHNOLOGY (2/17)
  24. CHAPTER 4. TECHNOLOGY (3/17)
  25. CHAPTER 4. TECHNOLOGY (4/17)
  26. CHAPTER 4. TECHNOLOGY (5/17)
  27. CHAPTER 4. TECHNOLOGY (6/17)
  28. CHAPTER 4. TECHNOLOGY (7/17)
  29. CHAPTER 4. TECHNOLOGY (8/17)
  30. CHAPTER 4. TECHNOLOGY (9/17)
  31. CHAPTER 4. TECHNOLOGY (10/17)
  32. CHAPTER 4. TECHNOLOGY (11/17)
  33. CHAPTER 4. TECHNOLOGY (12/17)
  34. CHAPTER 4. TECHNOLOGY (13/17)
  35. CHAPTER 4. TECHNOLOGY (14/17)
  36. CHAPTER 4. TECHNOLOGY (15/17)
  37. CHAPTER 4. TECHNOLOGY (16/17)
  38. CHAPTER 4. TECHNOLOGY (17/17)
  39. CHAPTER 5. SELECTING TECHNOLOGY (1/8)
  40. CHAPTER 5. SELECTING TECHNOLOGY (2/8)
  41. CHAPTER 5. SELECTING TECHNOLOGY (3/8)
  42. CHAPTER 5. SELECTING TECHNOLOGY (4/8)
  43. CHAPTER 5. SELECTING TECHNOLOGY (5/8)
  44. CHAPTER 5. SELECTING TECHNOLOGY (6/8)
  45. CHAPTER 5. SELECTING TECHNOLOGY (7/8)
  46. CHAPTER 5. SELECTING TECHNOLOGY (8/8)
  47. CHAPTER 6. PROCESS (1/7)
  48. CHAPTER 6. PROCESS (2/7)
  49. CHAPTER 6. PROCESS (3/7)
  50. CHAPTER 6. PROCESS (4/7)
  51. CHAPTER 6. PROCESS (5/7)
  52. CHAPTER 6. PROCESS (6/7)
  53. CHAPTER 6. PROCESS (7/7)
  54. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (1/9)
  55. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (2/9)
  56. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (3/9)
  57. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (4/9)
  58. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (5/9)
  59. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (6/9)
  60. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (7/9)
  61. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (8/9)
  62. CHAPTER 7. EXECUTION, REPORTING, AND ANALYSIS (9/9)
  63. CHAPTER 8. PLANNING (1/4)
  64. CHAPTER 8. PLANNING (2/4)
  65. CHAPTER 8. PLANNING (3/4)
  66. CHAPTER 8. PLANNING (4/4)
  67. CHAPTER 9. STRATEGIC VULNERABILITIES (1/6)
  68. CHAPTER 9. STRATEGIC VULNERABILITIES (2/6)
  69. CHAPTER 9. STRATEGIC VULNERABILITIES (3/6)
  70. CHAPTER 9. STRATEGIC VULNERABILITIES (4/6)
  71. CHAPTER 9. STRATEGIC VULNERABILITIES (5/6)
  72. CHAPTER 9. STRATEGIC VULNERABILITIES (6/6)
  73. CHAPTER 10. SUMMARY (1/4)
  74. CHAPTER 10. SUMMARY (2/4)
  75. CHAPTER 10. SUMMARY (3/4)
  76. CHAPTER 10. SUMMARY (4/4)
  77. Index (1/3)
  78. Index (2/3)
  79. Index (3/3)
  80. Back cover

Product information

  • Title: Vulnerability Management
  • Author(s): Park Foreman
  • Release date: August 2009
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439801512