Modern vulnerability management :: predictive cybersecurity. /
This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood :
Artech House,
2023.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation. You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat. This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change. |
Beschreibung: | Description based upon print version of record. |
Beschreibung: | 1 online resource |
ISBN: | 9781630819392 1630819395 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1378295436 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 230506s2023 mau o 000 0 eng d | ||
040 | |a YDX |b eng |e rda |c YDX |d N$T |d UKAHL |d YDX |d OCLCF |d IEEEE |d OCLCO |d BNG | ||
020 | |a 9781630819392 |q electronic book | ||
020 | |a 1630819395 |q electronic book | ||
020 | |z 1630819387 | ||
020 | |z 9781630819385 | ||
035 | |a (OCoLC)1378295436 | ||
037 | |a 10121000 |b IEEE | ||
050 | 4 | |a QA76.9.A25 |b R69 2023 | |
082 | 7 | |a 005.8 |2 23/eng/20230511 | |
049 | |a MAIN | ||
100 | 1 | |a Roytman, Michael. |e author. |0 http://id.loc.gov/authorities/names/no2023063232 | |
245 | 1 | 0 | |a Modern vulnerability management : |b predictive cybersecurity. / |c Michael Roytman |
264 | 1 | |a Norwood : |b Artech House, |c 2023. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
520 | |a This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation. You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat. This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Risk management. |0 http://id.loc.gov/authorities/subjects/sh85114200 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Gestion du risque. | |
650 | 7 | |a risk management. |2 aat | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Risk management |2 fast | |
700 | 1 | |a Bellis, Ed., |e editor. |0 http://id.loc.gov/authorities/names/no2023063234 | |
776 | 0 | 8 | |i Print version: |z 1630819387 |z 9781630819385 |w (OCoLC)1357136831 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3601456 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH41410389 | ||
938 | |a YBP Library Services |b YANK |n 305300399 | ||
938 | |a EBSCOhost |b EBSC |n 3601456 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1378295436 |
---|---|
_version_ | 1816882569659023361 |
adam_text | |
any_adam_object | |
author | Roytman, Michael |
author2 | Bellis, Ed |
author2_role | edt |
author2_variant | e b eb |
author_GND | http://id.loc.gov/authorities/names/no2023063232 http://id.loc.gov/authorities/names/no2023063234 |
author_facet | Roytman, Michael Bellis, Ed |
author_role | aut |
author_sort | Roytman, Michael |
author_variant | m r mr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 R69 2023 |
callnumber-search | QA76.9.A25 R69 2023 |
callnumber-sort | QA 276.9 A25 R69 42023 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1378295436 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03735cam a2200529 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1378295436</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">230506s2023 mau o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">UKAHL</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">BNG</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781630819392</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1630819395</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1630819387</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781630819385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1378295436</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10121000</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">R69 2023</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230511</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Roytman, Michael.</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2023063232</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern vulnerability management :</subfield><subfield code="b">predictive cybersecurity. /</subfield><subfield code="c">Michael Roytman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation. You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat. This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85114200</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion du risque.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">risk management.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bellis, Ed.,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2023063234</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1630819387</subfield><subfield code="z">9781630819385</subfield><subfield code="w">(OCoLC)1357136831</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3601456</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH41410389</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">305300399</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3601456</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1378295436 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:42Z |
institution | BVB |
isbn | 9781630819392 1630819395 |
language | English |
oclc_num | 1378295436 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Artech House, |
record_format | marc |
spelling | Roytman, Michael. author. http://id.loc.gov/authorities/names/no2023063232 Modern vulnerability management : predictive cybersecurity. / Michael Roytman Norwood : Artech House, 2023. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based upon print version of record. This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation. You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat. This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Information technology Security measures. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Sécurité informatique. Technologie de l'information Sécurité Mesures. Gestion du risque. risk management. aat Computer security fast Information technology Security measures fast Risk management fast Bellis, Ed., editor. http://id.loc.gov/authorities/names/no2023063234 Print version: 1630819387 9781630819385 (OCoLC)1357136831 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3601456 Volltext |
spellingShingle | Roytman, Michael Modern vulnerability management : predictive cybersecurity. / Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Information technology Security measures. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Sécurité informatique. Technologie de l'information Sécurité Mesures. Gestion du risque. risk management. aat Computer security fast Information technology Security measures fast Risk management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85114200 |
title | Modern vulnerability management : predictive cybersecurity. / |
title_auth | Modern vulnerability management : predictive cybersecurity. / |
title_exact_search | Modern vulnerability management : predictive cybersecurity. / |
title_full | Modern vulnerability management : predictive cybersecurity. / Michael Roytman |
title_fullStr | Modern vulnerability management : predictive cybersecurity. / Michael Roytman |
title_full_unstemmed | Modern vulnerability management : predictive cybersecurity. / Michael Roytman |
title_short | Modern vulnerability management : |
title_sort | modern vulnerability management predictive cybersecurity |
title_sub | predictive cybersecurity. / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Information technology Security measures. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Sécurité informatique. Technologie de l'information Sécurité Mesures. Gestion du risque. risk management. aat Computer security fast Information technology Security measures fast Risk management fast |
topic_facet | Computer security. Information technology Security measures. Risk management. Sécurité informatique. Technologie de l'information Sécurité Mesures. Gestion du risque. risk management. Computer security Information technology Security measures Risk management |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3601456 |
work_keys_str_mv | AT roytmanmichael modernvulnerabilitymanagementpredictivecybersecurity AT bellised modernvulnerabilitymanagementpredictivecybersecurity |