INTRODUCTION; How to Use This Book; Background; Getting Started; Types of Patches; Product Vendors Responsibility; ; VULNERABILITY TO PATCH TO EXPLOIT; Who Exploits, When, Why and How; Tracking New Patch Releases; ; WHAT TO PATCH; Desktops; Remote Users; Servers; Network Devices; ; NETWORK AND SYSTEMS MANAGEMENT: ITIL; Network and Systems Management; Starting with Process; ITIL; Assessing and Implementing IT Operations; ; SECURITY MANAGEMENT; Overview; Preparing for Security Operations; Establishing Security Operations; Implementing Security Operations; Next Steps; ; VULNERABILITY MANAGEMENT; What is Vulnerability Management?; Vulnerability Management Process; Establishing Vulnerability Management; Next Steps; ; TOOLS; Process versus Tools; Where to Use Them; How to Determine Which One is Best; Tools Evaluated; ; TESTING; Common Issues with Testing; The Testing Process; Patch Ratings and How They Affect Testing; Prioritizing the Test Process; The Test Lab; Virtual Machines; Wrapping It Up; ; PROCESS LIFE CYCLE; Roles and Responsibilities; Analysis; Remediation; Update Operational Environment; Tracking; ; PUTTING THE PROCESS IN PLACE; Plan; Design; Implement; Operate; Maintain; Patch Management Policy; ; ZERO-DAY ATTACK; The scenario; The solution; Post Mortem; ; CONCLUSION; Challenges; Next Steps
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
COMPUTERS -- Internet -- Security.
موضوع مستند نشده
Software maintenance.
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نشانه اثر
F455
2005
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )