Effective vulnerability management: managing risk in the vulnerable digital ecosystem
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
[2024]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781394221202/?ar |
Zusammenfassung: | Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society. |
Beschreibung: | Description based on online resource; title from digital title page (viewed on April 11, 2024) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781394277155 1394277156 9781394221226 1394221223 9781394221219 1394221215 9781394221202 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102562733 | ||
003 | DE-627-1 | ||
005 | 20240429114544.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781394277155 |c electronic book |9 978-1-394-27715-5 | ||
020 | |a 1394277156 |c electronic book |9 1-394-27715-6 | ||
020 | |a 9781394221226 |c electronic book |9 978-1-394-22122-6 | ||
020 | |a 1394221223 |c electronic book |9 1-394-22122-3 | ||
020 | |a 9781394221219 |c electronic bk. |9 978-1-394-22121-9 | ||
020 | |a 1394221215 |c electronic bk. |9 1-394-22121-5 | ||
020 | |a 9781394221202 |9 978-1-394-22120-2 | ||
035 | |a (DE-627-1)102562733 | ||
035 | |a (DE-599)KEP102562733 | ||
035 | |a (ORHE)9781394221202 | ||
035 | |a (DE-627-1)102562733 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240411 | |
100 | 1 | |a Hughes, Chris |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Effective vulnerability management |b managing risk in the vulnerable digital ecosystem |c Chris Hughes, Nikki Robinson |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c [2024] | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from digital title page (viewed on April 11, 2024) | ||
520 | |a Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Robinson, Nikki |e VerfasserIn |4 aut | |
776 | 1 | |z 1394221207 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1394221207 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781394221202/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102562733 |
---|---|
_version_ | 1821494932974600192 |
adam_text | |
any_adam_object | |
author | Hughes, Chris Robinson, Nikki |
author_facet | Hughes, Chris Robinson, Nikki |
author_role | aut aut |
author_sort | Hughes, Chris |
author_variant | c h ch n r nr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102562733 (DE-599)KEP102562733 (ORHE)9781394221202 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03891nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-102562733</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114544.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394277155</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-27715-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394277156</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-27715-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394221226</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-22122-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394221223</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-22122-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394221219</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-22121-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394221215</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-22121-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394221202</subfield><subfield code="9">978-1-394-22120-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562733</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102562733</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781394221202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562733</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240411</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hughes, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Effective vulnerability management</subfield><subfield code="b">managing risk in the vulnerable digital ecosystem</subfield><subfield code="c">Chris Hughes, Nikki Robinson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on April 11, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robinson, Nikki</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1394221207</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1394221207</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781394221202/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102562733 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:14Z |
institution | BVB |
isbn | 9781394277155 1394277156 9781394221226 1394221223 9781394221219 1394221215 9781394221202 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Hughes, Chris VerfasserIn aut Effective vulnerability management managing risk in the vulnerable digital ecosystem Chris Hughes, Nikki Robinson Hoboken, New Jersey John Wiley & Sons, Inc. [2024] 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based on online resource; title from digital title page (viewed on April 11, 2024) Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society. Computer security Sécurité informatique Robinson, Nikki VerfasserIn aut 1394221207 Erscheint auch als Druck-Ausgabe 1394221207 |
spellingShingle | Hughes, Chris Robinson, Nikki Effective vulnerability management managing risk in the vulnerable digital ecosystem Computer security Sécurité informatique |
title | Effective vulnerability management managing risk in the vulnerable digital ecosystem |
title_auth | Effective vulnerability management managing risk in the vulnerable digital ecosystem |
title_exact_search | Effective vulnerability management managing risk in the vulnerable digital ecosystem |
title_full | Effective vulnerability management managing risk in the vulnerable digital ecosystem Chris Hughes, Nikki Robinson |
title_fullStr | Effective vulnerability management managing risk in the vulnerable digital ecosystem Chris Hughes, Nikki Robinson |
title_full_unstemmed | Effective vulnerability management managing risk in the vulnerable digital ecosystem Chris Hughes, Nikki Robinson |
title_short | Effective vulnerability management |
title_sort | effective vulnerability management managing risk in the vulnerable digital ecosystem |
title_sub | managing risk in the vulnerable digital ecosystem |
topic | Computer security Sécurité informatique |
topic_facet | Computer security Sécurité informatique |
work_keys_str_mv | AT hugheschris effectivevulnerabilitymanagementmanagingriskinthevulnerabledigitalecosystem AT robinsonnikki effectivevulnerabilitymanagementmanagingriskinthevulnerabledigitalecosystem |