did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781593279882

Practical Vulnerability Management A Strategic Approach to Managing Cyber Risk

by
  • ISBN13:

    9781593279882

  • ISBN10:

    1593279884

  • Format: Paperback
  • Copyright: 2020-10-06
  • Publisher: No Starch Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.95 Save up to $7.49
  • Buy Used
    $22.46

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.

Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities.

Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.

The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software.

Along the way, you'll learn how to:
  • Generate accurate and usable vulnerability intelligence
  • Scan your networked systems to identify and assess bugs and vulnerabilities
  • Prioritize and respond to various security risks
  • Automate scans, data analysis, reporting, and other repetitive tasks
  • Customize the provided scripts to adapt them to your own needs

  • Playing whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.

    Author Biography

    Andrew Magnusson has been working in the information security field since 2002, in areas ranging from firewall configuration to security consulting to managing SOC2 compliance. As a consultant deploying enterprise vulnerability management tools he has seen how an organization's vulnerability management practices, or lack thereof, affects their overall information security posture.

    Table of Contents

    Introduction

    Part I: Vulnerability Management Basics
    Chapter 1: Basic Concepts
    Chapter 2: Sources of Information
    Chapter 3: Vulnerability Scanners
    Chapter 4: Automating Vulnerability Management
    Chapter 5: Vulnerability Management Outcomes
    Chapter 6: Vulnerability Management and Organizational Priorities

    Part II: Hands-on Vulnerability Management
    Chapter 7: Setting Up Your Environment
    Chapter 8: Using the Data Collection Tools
    Chapter 9: Getting Your Data into Usable Format
    Chapter 10: Maintaining the Database
    Chapter 11: Generating Asset and Vulnerability Reports
    Chapter 12: Automating Scans and Reporting
    Chapter 13: Advanced Reporting
    Chapter 14: Advanced Topics
    Chapter 15. Conclusion
    Index

    Supplemental Materials

    What is included with this book?

    The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

    The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

    Rewards Program