Security Patch Management, 2nd Edition Front Cover

Security Patch Management, 2nd Edition

  • Length: 284 pages
  • Edition: 2
  • Publisher:
  • Publication Date: 2011-04-05
  • ISBN-10: 1439824991
  • ISBN-13: 9781439824993
  • Sales Rank: #4537247 (See Top 100 Books)
Description

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that’s often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it’s about having a formal process in place that can deploy patches to vulnerable systems quickly.

Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to:

  • Design your own patch release process and keep it action ready
  • Test the effectiveness of your patches
  • Keep up with the latest patch releases
  • Prioritize the vulnerabilities that need to be addressed
  • Apply patches quickly and without draining essential network resources

This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Table of Contents

Chapter 1: Introduction
Chapter 2: Vulnerability to Patch to Exploit
Chapter 3: What to Patch
Chapter 4: Network and Systems Management : Information Technology Infrastructure Library
Chapter 5: Security Management
Chapter 6: Vulnerability Management
Chapter 7: Tools
Chapter 8: Testing
Chapter 9: Process Life Cycle
Chapter 10: Putting the Process in Place
Chapter 11: Conclusion

To access the link, solve the captcha.