Description
Apress Asset Attack Vectors: Building Effective Vulnerability Management Strategies To Protect Organizations by Morey J. Haber
Chapter 1: The Attack Chain.- Chapter 2: The Vulnerability Landscape.- Chapter 3: Threat Intelligence.- Chapter 4: Credential Asset Risks.- Chapter 5: Vulnerability Assessment.- Chapter 6: Configuration Assessment.- Chapter 7: Risk Measurement.- Chapter 8: Vulnerability States.- Chapter 9: Vulnerability Authorities.- Chapter 10: Penetration Testing.- Chapter 11: Remediation.- Chapter 12: The Vulnerability Management Program.- Chapter 13: Vulnerability Management Planning.- Chapter 14: Vulnerability Management Development.- Chapter 15: Vulnerability Management Deployment.- Chapter 16: Vulnerability Management Operations.- Chapter 17: Vulnerability Management Architecture.- Chapter 18: Sample Vulnerability Plan.- Chapter 19: Regulatory Compliance.- Chapter 20: Risk Management Frameworks.- Chapter 21: Making It All Work.- Chapter 22: Tales From The Trenches.- Chapter 23: Final Recommendations.- Chapter 24: Conclusion.- Appendix A: Sample Request For Proposal (Rfp).- Appendix B: Request For Proposal Spreadsheet.-