Have one to sell?
Vulnerability Management Hardcover – 8 Sep 2009
See all 2 formats and editions Hide other formats and editions
|New from||Used from|
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Would you like to tell us about a lower price?
If you are a seller for this product, would you like to suggest updates through seller support?
Many people are unaware of vulnerability management (VM), which can help ensure security for information technology infrastructure and improve an organization's governance, risk, and compliance posture. This work can help to rectify that lack of knowledge. … The author's writing style is direct and chapters are well-sequenced and organized. Foreman's use of examples and detailed case studies help the reader to understand how vulnerabilities are created. Illustrations further clarify VM and most chapters provide a concise summary. Overall, this book provides excellent guidance for the information security practitioner and the network security engineer, as well as those who need an understanding of the strategic significance of vulnerabilities and reasons for their control.
―Steven T. Yanagimach, CISSP, The Boeing Company, in Security Management, October 2011
Vulnerability management proactively prevents the exploitation of IT security gaps and weaknesses that exist particularly within a larger organization. This book demonstrates how prevention can reduce the potential for exploitation and shows that it takes considerably less time and resources to manage potential weaknesses, than to clean up after a violation. Written by a leading expert in IT security, this volume provides guidance for creating a vulnerability management program in a large, globally distributed company. It covers areas often neglected or falsely appearing secure. The text includes checklists and details the activities that constitute successful management.
Top customer reviews
Most helpful customer reviews on Amazon.com
Amazon.com: 1 reviews