1 / 221
文档名称:

The Manager's Guide to Web Application Security教材.pdf

格式:pdf   页数:221页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

The Manager's Guide to Web Application Security教材.pdf

上传人:新起点 2015/11/26 文件大小:0 KB

下载得到文件列表

The Manager's Guide to Web Application Security教材.pdf

相关文档

文档介绍

文档介绍:BOOKS FOR PROFESSIONALS BY PROFESSIONALS®
Lepofsky
RELATED
The Manager’s Guide to Web
Application Security
The Manager’s Guide to Web Application Security is a concise, information-packed guide to
application security risks anization faces, written in plain language, with guidance on
how to deal with those issues quickly and effectively. Often, security vulnerabilities are diffi cult
to understand and quantify because they are the result of intricate programming defi ciencies
and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the
technical barrier and identifi es many real-world examples of security monly
found by IT security auditors, translates them into business risks with identifi able consequences,
and provides practical guidance about mitigating them.
The Manager’s Guide to Web Application Security describes how to fi x and prevent these
vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation.
For easy reference, the information is also presented schematically in Excel spreadsheets
available to readers for free download from the publisher’s digital annex. The book is current,
concise, and to the point—which is to help managers cut through the technical jargon and make
the business decisions required to fi nd, fi x, and prevent serious vulnerabilities.
What you get:
• Executives: prehend what the application security team is saying in
terms of risk and remediation
• Security experts: Understand how to express threats in terms of business risk
to executives
• Details about currently relevant vulnerabilities, by vulnerability class and risk level
• Decision criteria for what type of security audit is required for your environment
• Downloadable information tables, examples, and reusable forms
• Information about pliance, including appendices that detail relevant
standards, such as COBIT5 IT Security, Experian EI3PA Security