Finding and Fixing Vulnerabilities in Information Systems
By: and and and
Sign Up Now!
Already a Member? Log In
You must be logged into Bookshare to access this title.
Learn about membership options,
or view our freely available titles.
- Synopsis
- Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors introduce the Vulnerability Assessment and Mitigation methodology, a six-step process that uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses.
- Copyright:
- 2003
Book Details
- Book Quality:
- Publisher Quality
- ISBN-13:
- 9780833035998
- Publisher:
- RAND Corporation
- Date of Addition:
- 09/29/11
- Copyrighted By:
- RAND
- Adult content:
- No
- Language:
- English
- Has Image Descriptions:
- No
- Categories:
- Nonfiction, Politics and Government
- Submitted By:
- Bookshare Staff
- Usage Restrictions:
- This is a copyrighted book.
Reviews
Other Books
- by Michael Scheiern
- by Philip S. Anton
- by Richard Mesic
- by Robert H. Anderson
- in Nonfiction
- in Politics and Government