• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Network security assessment :

پدید آورنده
Steve Manzuik, André Gold, Chris Gatford.

موضوع
Computer networks-- Security measures.,Computer security-- Evaluation-- Methodology.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
TK5105
.
59
.
M38
2007eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0080512534
(Number (ISBN
1281112607
(Number (ISBN
1429453796
(Number (ISBN
1597491012
(Number (ISBN
661111260X
(Number (ISBN
6612540842
(Number (ISBN
9780080512532
(Number (ISBN
9781281112606
(Number (ISBN
9781429453790
(Number (ISBN
9781597491013
(Number (ISBN
9786611112608
(Number (ISBN
9786612540844

NATIONAL BIBLIOGRAPHY NUMBER

Number
b736727

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Network security assessment :
General Material Designation
[Book]
Other Title Information
from vulnerability to patch /
First Statement of Responsibility
Steve Manzuik, André Gold, Chris Gatford.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Sebastopol, Calif. :
Name of Publisher, Distributor, etc.
O'Reilly Media [distributor],
Date of Publication, Distribution, etc.
©2007.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxii, 372 pages) :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Chapter 1. Windows of Vulnerability -- Chapter 2. Vulnerability Assessment 101 -- Chapter 3. Vulnerability Assessment Methodologies -- Chapter 4. Vulnerability Assessment tools -- Chapter 5. Vulnerability Assessment Step 1 -- Chapter 6. Vulnerability Assessment Step 2 -- Chapter 7. Identifying Vulnerabilities -- Chapter 8. Going further -- Chapter 9. Vulnerability Management -- Chapter 10. Vulnerability Management Methodologies -- Chapter 11. Vulnerability Management Tools -- Chapter 12. Vulnerability Remediation -- Chapter 13. Regulatory Compliance -- Chapter 14. Tying it All Together.
0

SUMMARY OR ABSTRACT

Text of Note
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation. * Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system * Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine * Covers in the detail the vulnerability management lifecycle from discovery through patch.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Elsevier Science & Technology
Stock Number
135462:135597

OTHER EDITION IN ANOTHER MEDIUM

Title
Network security assessment.
International Standard Book Number
9781597491013

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security-- Evaluation-- Methodology.
Computer networks-- Security measures.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
M38
2007eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Manzuik, Steve.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Gatford, Chris.
Gold, André.

ORIGINATING SOURCE

Date of Transaction
20201203204701.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival