Cargando…

Managing a network vulnerability assessment

Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation o...

Descripción completa

Detalles Bibliográficos
Autores principales: Peltier, Thomas R, Peltier, Justin, Blackley, John A
Lenguaje:eng
Publicado: Auerbach Publishers 2003
Materias:
Acceso en línea:http://cds.cern.ch/record/2705102
_version_ 1780964770350891008
author Peltier, Thomas R
Peltier, Justin
Blackley, John A
author_facet Peltier, Thomas R
Peltier, Justin
Blackley, John A
author_sort Peltier, Thomas R
collection CERN
description Managing A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
id cern-2705102
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2003
publisher Auerbach Publishers
record_format invenio
spelling cern-27051022021-04-21T18:12:50Zhttp://cds.cern.ch/record/2705102engPeltier, Thomas RPeltier, JustinBlackley, John AManaging a network vulnerability assessmentComputing and ComputersManaging A Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats. It focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what parts of their network need to be hardened, and avoid expensive and unnecessary purchases.Auerbach Publishersoai:cds.cern.ch:27051022003
spellingShingle Computing and Computers
Peltier, Thomas R
Peltier, Justin
Blackley, John A
Managing a network vulnerability assessment
title Managing a network vulnerability assessment
title_full Managing a network vulnerability assessment
title_fullStr Managing a network vulnerability assessment
title_full_unstemmed Managing a network vulnerability assessment
title_short Managing a network vulnerability assessment
title_sort managing a network vulnerability assessment
topic Computing and Computers
url http://cds.cern.ch/record/2705102
work_keys_str_mv AT peltierthomasr managinganetworkvulnerabilityassessment
AT peltierjustin managinganetworkvulnerabilityassessment
AT blackleyjohna managinganetworkvulnerabilityassessment