Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability management"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
vulnerability management »
vulnerability assessment
Showing
1
-
20
of
87
Search:
'"Vulnerability management"'
,
query time: 0.20s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Vulnerability
management
by
Foreman, Park
Published 2010
Auerbach Publications
Call Number:
QA76.9.A25
Read Now
2
Vulnerability
Management
by
Foreman, Park
Published 2019
Auerbach Publications
Table of Contents:
“
... -- Process -- Execution, reporting, and analysis -- Planning -- Strategic
vulnerabilities
--
Managing
...
”
Call Number:
QA76.9.A25
Read Now
3
Practical
vulnerability
management
: a strategic approach to managing cyber risk
by
Magnusson, Andrew
Published 2020
No Starch Press, Inc.
“
... on a budget. It starts by discussing the components of a
vulnerability
management
program...
”
Call Number:
TK5105.59
Read Now
4
Effective
vulnerability
management
: managing risk in the vulnerable digital ecosystem
by
Hughes, Chris
,
Robinson, Nikki
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
... Configuration 53 -- 4 Continuous
Vulnerability
Management
69 -- 5 Vulnerability Scoring and Software...
”
Call Number:
QA76.9.A25
Read Now
5
Risk Mitigation,
Vulnerability
Management
and Resilience under Disasters
by
Sapountzaki, Kalliopi
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Read Now
6
Integrated Risk and
Vulnerability
Management
Assisted by Decision Support Systems : Relevance and Impact on Governance
Published 2005
Springer Netherlands
Table of Contents:
“
...Disaster Risk and
Vulnerability
Management
from Awareness to Practice -- Quantitative Area Risk...
”
Read Now
7
Asset attack vectors : building effective vulnerability management strategies to protect organizations
by
Haber, Morey J.
Published 2018
Apress
Table of Contents:
“
...; The
Vulnerability
Management
Process; Assessment; Measure; Remediation; Rinse and Repeat {Cycle}; End of Life...
”
Call Number:
QA76.9.A25
Read Now
8
Asset Attack Vectors : Building Effective Vulnerability Management Strategies to Protect Organizations
by
Haber, Morey J.
,
Hibbert, Brad
Published 2018
Apress
Table of Contents:
“
...: The
Vulnerability
Management
Program -- Chapter 13:
Vulnerability
Management
Planning -- Chapter 14:
Vulnerability
...
”
Read Now
9
Network security assessment : from vulnerability to patch
by
Manzuik, Steve
Published 2006
Syngress Pub.
Table of Contents:
“
... -- Ch. 6. Going further -- Ch. 7.
Vulnerability
management
-- Ch. 8.
Vulnerability
management
tools...
”
Call Number:
TK5105.59
Read Now
10
Designing a HIPAA-Compliant Security Operations Center : A Guide to Detecting and Responding to Healthcare Breaches and Events
by
Thompson, Eric C.
Published 2020
Apress
Table of Contents:
“
... and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4:
Vulnerability
Management
-- Chapter 5...
”
Read Now
11
Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events
by
Thompson, Eric C.
Published 2020
APress
Table of Contents:
“
... and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4:
Vulnerability
Management
-- Chapter 5...
”
Call Number:
QA76.9.A25
Read Now
12
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
by
Rogers, Bobby E.
Published 2021
McGraw-Hill Education
Table of Contents:
“
... -- 1.0 Threat and
Vulnerability
Management
-- Objective 1.1 Explain the importance of threat data...
”
Call Number:
QA76.9.A25
Read Now
13
IoT and OT Security Handbook : Assess Risks, Manage Vulnerabilities, and Monitor Threats with Microsoft Defender for IoT
by
Jain, Smita
,
Lakshmi, Vasantha
Published 2023
Packt Publishing, Limited
Table of Contents:
“
... inventory -- Risk and
vulnerability
management
-- Continuous threat monitoring -- Operational efficiency...
”
Call Number:
TK5105.8857
Read Now
14
CompTIA CySA+ Practice Tests : Exam CS0-003
by
Chapple, Mike
Published 2023
John Wiley & Sons, Incorporated
Table of Contents:
“
... -- Chapter 1: Domain 1.0: Security Operations -- Chapter 2: Domain 2.0:
Vulnerability
Management
-- Chapter 3...
”
Call Number:
QA76.3
Read Now
15
Information Security : 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers
Published 2019
Springer International Publishing
Table of Contents:
“
... engineering -- Operating systems security -- Browser security -- Denial-of-service attacks --
Vulnerability
...
”
Read Now
16
The best damn IT security management book period
by
Susan Snedaker
Published 2007
Syngress
Table of Contents:
“
.... Vulnerability Assessment: Step Two -- Ch. 6. Going Further -- Ch. 7.
Vulnerability
Management
-- Ch. 8...
”
Call Number:
QA76.9.A25
Read Now
17
Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
by
Diogenes, Yuri
,
Ozkaya, Erdal
Published 2022
Packt Publishing
Table of Contents:
“
... Investigating an Incident Recovery Process
Vulnerability
Management
Log Analysis...
”
Call Number:
QA76.9.A25
Read Now
18
Cybersecurity threats and vulnerabilities : NICE framework work roles for K0005
Published 2023
O'Reilly Media, Inc.
“
... and software vulnerabilities Which
vulnerability
management
system works with your environment How to interpret...
”
Call Number:
TK5105.59
Read Now
19
Defensive security handbook : best practices for securing infrastructure
by
Brotherston, Lee
,
Berlin, Amanda
Published 2017
O'Reilly Media
Table of Contents:
“
... --
Vulnerability
management
-- Development -- Purple teaming -- IDS and IPS -- Logging and monitoring -- The extra...
”
Call Number:
QA76.9.A25
Read Now
20
Secure and Trusted Cyber Physical Systems : Recent Approaches and Future Directions
Published 2022
Springer International Publishing
Table of Contents:
“
... Identification Methods for Industrial Control Systems --
Vulnerability
Management
in IIoT-based systems: What...
”
1
2
3
4
5
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
59
331 - Labor economics
35
374 - Adult education
17
658 - General management
16
004 - Data processing & computer science
9
338 - Production
5
more ...
330 - Economics
4
620 - Engineering & allied operations
3
000 - Computer science, information & general works
2
006 - Special computer methods
2
333 - Economics of land & energy
2
368 - Insurance
2
384 - Communications; telecommunication
2
008 - [Unassigned]
1
153 - Mental processes & intelligence
1
300 - Social sciences
1
301 - Sociology & anthropology
1
302 - Social interaction
1
320 - Political science
1
332 - Financial economics
1
363 - Other social problems & services
1
364 - Criminology
1
380 - Commerce, communications & transportation
1
500 - Natural sciences & mathematics
1
515 - Analysis
1
518 - Numerical analysis
1
600 - Technology
1
621 - Applied physics
1
629 - Other branches of engineering
1
700 - The arts; fine & decorative arts
1
900 - History & geography
1
see all ...
less ...
Language
English
86
German
1
Collection
O'Reilly
64
Springer eBooks 2005-
21
Directory of Open Access Books
1
Springer Book Archives -2004
1
Author
Chapple, Mike
5
Seidl, David
5
Lowrie, Daniel
4
Coetzee, Marijke
3
Eloff, Mariki
3
Loock, Marianne
3
more ...
Rahalkar, Sagar
3
Venter, Hein
3
Williams, Branden R.
3
Blyth, Andrew
2
Chuvakin, Anton
2
Fisher, Derek
2
Foreman, Park
2
Haber, Morey J.
2
Hibbert, Brad
2
Milroy, Derek
2
Pompon, Raymond
2
Rains, Tim
2
Simmons, Andrea C.
2
Thompson, Eric C.
2
ACI Learning
1
Badhwar, Raj
1
Baker, Debra
1
Berlin, Amanda
1
Bhargava, Hersh
1
Birch, Mark
1
Bradley, Tony
1
Brotherston, Lee
1
Brumley, Billy Bob
1
Burton, James D.
1
Capocchi, Alessandro
1
Castaldo, Chris
1
Chaplin, Stefania
1
Chow, Gloria
1
Chowdhary, Ankush
1
Chuvakin, Anton A.
1
Cunningham, Bryan
1
Daimi, Kevin
1
Das, Anand M.
1
Death, Darren
1
Diogenes, Yuri
1
Dotson, Chris
1
Foo, Ernest
1
Fra.Paleo, Urbano
1
Futcher, Lynn
1
Gatford, Chris
1
Gheorghe, A.V.
1
Gold, André
1
Goodwin, Sophie
1
Gordon, Adam
1
Greenley, Ray
1
Hagen, Janne
1
Haines, Brad
1
Hirao, Joey
1
Hoffman, Andrew
1
Howard, Sean
1
Hughes, Chris
1
IT Governance (Organization) Research Team
1
Iyer, Sreekanth
1
Jackson, Jasmine
1
Jadidi, Zahra
1
Jain, Smita
1
Jaquith, Andrew
1
Jøsang, Audun
1
Kebschull, Udo
1
Kesswani, Nishtha
1
Kranjac, Sasha
1
Kudović, Omar
1
Kulkarni, Prashant
1
Lakhani, Aamir
1
Lakshmi, Vasantha
1
Macías-Medrano, Jesús Manuel
1
Magnusson, Andrew
1
Manzuik, Steve
1
Mehta, Shobhit
1
Messdaghi, Chloé
1
Misra, Rajiv
1
Muniz, Joseph
1
Nádai, László
1
Oka, Dennis Kengo
1
Ozkaya, Erdal
1
Padányi, József
1
Pal, Shantanu
1
Paulus, Sachar
1
Peoples, Cathryn
1
Pohlmann, Norbert
1
Rajarajan, Muttukrishnan
1
Reimer, Helmut
1
Robinson, Nikki
1
Rogers, Bobby E.
1
Rothrock, Ray A.
1
Röning, Juha
1
Sandbu, Marius
1
Sapountzaki, Kalliopi
1
Seaman, Jim
1
Sehgal, Vandana Verma
1
Shimonski, Robert
1
Spangenberg, Ward
1
Srivathsa, Rohini
1
Stine, Brad
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=%22Vulnerability+management%22&type=AllFields
Send by Email
×
Loading...