Vulnerability Assessment
Introduction
In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
Each technical advance brings new security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic ...
Get Nessus Network Auditing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.