Introduction
The Vulnerability Experience
Program and Organization
Technology
Selecting Technology
Process
Execution, Reporting and Analysis
Planning
Strategic Vulnerabilities
Summary
Many people are unaware of vulnerability management (VM), which can
help ensure security for information technology infrastructure and
improve an organization's governance, risk, and compliance posture.
This work can help to rectify that lack of knowledge. … The
author's writing style is direct and chapters are well-sequenced
and organized. Foreman's use of examples and detailed case studies
help the reader to understand how vulnerabilities are created.
Illustrations further clarify VM and most chapters provide a
concise summary. Overall, this book provides excellent guidance for
the information security practitioner and the network security
engineer, as well as those who need an understanding of the
strategic significance of vulnerabilities and reasons for their
control.
—Steven T. Yanagimach, CISSP, The Boeing Company, in Security
Management, October 2011
Ask a Question About this Product More... |