Text
Network security assessment: from vulnerability to patch
The hacker playbook 2: practical guide to penetration testing This book is not your typical information technology (IT) security book. Even though the authors of this book have technical backgrounds and have worked on such best-selling titles as Syngress’ Hack Proofing Your Network, this book integrates the technical aspects of vulnerability management into the management of your business. Although it is important to be up on all the latest hacking methods, this knowledge is valuable only if you can tie the threats imposed by hackers to the risks these threats pose to your organization. This book will give you the tools to do just that. Specifically, this chapter will address vulnerabilities and why they are important. We will also discuss a concept known as Windows of Vulnerability, and we will talk about how to determine the risk a given vulnerability poses to your environment.
Tidak tersedia versi lain