TY - BOOK ID - 1171396 TI - Vulnerability Management PY - 2019 SN - 0415015464 0415015472 1000005097 0429289650 9781000005097 9780429289651 9781000018455 1000018458 9781000011937 1000011933 0367235145 PB - Milton : Auerbach Publications, DB - UniCat KW - Fiction KW - American literature KW - English literature KW - anno 1900-1999 KW - American fiction KW - English fiction KW - Feminism and literature KW - Identity (Psychology) in literature KW - Postmodernism KW - Sex role in literature KW - Women and literature KW - Roman américain KW - Roman anglais KW - Féminisme et littérature KW - Identité (Psychologie) dans la littérature KW - Postmodernisme KW - Rôle selon le sexe dans la littérature KW - Femmes et littérature KW - Women authors KW - History and criticism KW - Femmes écrivains KW - Histoire et critique KW - 82.015.9 KW - 82:396 KW - -American fiction KW - -English fiction KW - -Feminism and literature KW - Psychological fiction KW - -Fiction KW - Literature KW - Post-modernism KW - Postmodernism (Philosophy) KW - Arts, Modern KW - Avant-garde (Aesthetics) KW - Modernism (Art) KW - Philosophy, Modern KW - Post-postmodernism KW - Literaire stromingen: postmodernisme KW - Literatuur en feminisme KW - -History and criticism KW - Woolf, Virginia KW - -Criticism and interpretation KW - 82:396 Literatuur en feminisme KW - 82.015.9 Literaire stromingen: postmodernisme KW - -Literaire stromingen: postmodernisme KW - -Literature KW - -Post-modernism KW - Roman américain KW - Féminisme et littérature KW - Identité (Psychologie) dans la littérature KW - Rôle selon le sexe dans la littérature KW - Femmes et littérature KW - Femmes écrivains KW - Postmodernism (Literature) KW - Women authors&delete& KW - Woolf, Virginia, KW - Woolf, Virginia Stephen, KW - Stephen, Virginia, KW - Ulf, Virzhinii︠a︡, KW - Ṿolf, Ṿirg'inyah, KW - Vulf, Virdzhinii︠a︡, KW - Вулф, Вирджиния, KW - וולף, וירג׳יניה KW - וולף, וירג׳יניה, KW - Stephen, Adeline Virginia, KW - Criticism and interpretation. KW - Information technology KW - Computer security. KW - Security measures. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Littérature anglaise KW - Littérature américaine KW - Woolf, Virginia (1882-1941) KW - 20e siècle KW - Critique et interprétation UR - https://www.unicat.be/uniCat?func=search&query=sysid:1171396 AB - Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise. ER -