Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security…mehr
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security auditors, translates them into business risks with identifiable consequences, and provides practical guidance about mitigating them.
The Manager's Guide to Web Application Security describes how to fix and prevent these vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation. For easy reference, the information is also presented schematically in Excel spreadsheets available to readers for free download from the publisher’s digital annex. The book is current, concise, and to the point—which is to help managers cut through the technical jargon and make the business decisions required to find, fix, and prevent serious vulnerabilities.
Ron Lepofsky is the president of ERE Information Security Auditors, which he founded in 2000. He holds the CISSP and CISM security certifications and a degree in mechanical engineering from the University of Toronto. He has extensive experience managing the web application security audit process, advising senior management on remediating security weaknesses, and translating the technical findings of his auditor teams into actionable terms for management.
Inhaltsangabe
1. Understanding IT Security Risks 2. Types of Web Application Security Testing 3. Web Application Vulnerabilities and the Damage They Can Cause 4. Web Application Vulnerabilities and Countermeasures 5. How to Build Preventative Countermeasures for Web Application Vulnerabilities 6. How to Manage Security on Applications Written by Third Parties 7. Integrating Compliance with Web Application Security 8. How to Create a Business Case Cost for Web Application Security 9. Parting Thoughts A. COBIT 5 for Information Security B. Experian EI3PA Security Audit C. ISO/IEC 17799:2005 and the ISO/IEC 27000:2014 Series D. North American Energy Council Security Standard for Critical Infrastructure Protection (NERC CIP) E. NIST 800 Guidelines F. Payment Card Industry (PCI) Data Security Standard G. Sarbanes-Oxley Security Compliance Requirements H. Sources of Information
1. Understanding IT Security Risks 2. Types of Web Application Security Testing 3. Web Application Vulnerabilities and the Damage They Can Cause 4. Web Application Vulnerabilities and Countermeasures 5. How to Build Preventative Countermeasures for Web Application Vulnerabilities 6. How to Manage Security on Applications Written by Third Parties 7. Integrating Compliance with Web Application Security 8. How to Create a Business Case Cost for Web Application Security 9. Parting Thoughts A. COBIT 5 for Information Security B. Experian EI3PA Security Audit C. ISO/IEC 17799:2005 and the ISO/IEC 27000:2014 Series D. North American Energy Council Security Standard for Critical Infrastructure Protection (NERC CIP) E. NIST 800 Guidelines F. Payment Card Industry (PCI) Data Security Standard G. Sarbanes-Oxley Security Compliance Requirements H. Sources of Information
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu