Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
16 Managing Network Vulnerability Assessment
Where the tasks start and end
Time estimates
Resources assigned to each task
Task dependencies
For our purpose (project scope), the most important of these is where the
tasks start and end (physically and logically) because, with the Project Over-
view Statement and the Task List (complete with limits on the tasks), we can
produce the Project Scope Document for an NVA. When we look at developing
the Task List later in this chapter, we will have to go into more detail than
we have here.
Developing the Project Overview Statement
We develop the Project Overview Statement by discussing the aims and benefits ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041