Cargando…
Managing a network vulnerability assessment
Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation o...
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Auerbach Publishers
2003
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2705102 |
_version_ | 1780964770350891008 |
---|---|
author | Peltier, Thomas R Peltier, Justin Blackley, John A |
author_facet | Peltier, Thomas R Peltier, Justin Blackley, John A |
author_sort | Peltier, Thomas R |
collection | CERN |
description | Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases. |
id | cern-2705102 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2003 |
publisher | Auerbach Publishers |
record_format | invenio |
spelling | cern-27051022021-04-21T18:12:50Zhttp://cds.cern.ch/record/2705102engPeltier, Thomas RPeltier, JustinBlackley, John AManaging a network vulnerability assessmentComputing and ComputersManaging A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases.Auerbach Publishersoai:cds.cern.ch:27051022003 |
spellingShingle | Computing and Computers Peltier, Thomas R Peltier, Justin Blackley, John A Managing a network vulnerability assessment |
title | Managing a network vulnerability assessment |
title_full | Managing a network vulnerability assessment |
title_fullStr | Managing a network vulnerability assessment |
title_full_unstemmed | Managing a network vulnerability assessment |
title_short | Managing a network vulnerability assessment |
title_sort | managing a network vulnerability assessment |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2705102 |
work_keys_str_mv | AT peltierthomasr managinganetworkvulnerabilityassessment AT peltierjustin managinganetworkvulnerabilityassessment AT blackleyjohna managinganetworkvulnerabilityassessment |