Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
66 Vulnerability ManageMent
4.2.2 User-Supplied Hardware and Virtualization
is is similar to the appliance approach; the distinction is that you
provide your own hardware to support the vulnerability tool. is is
obviously very common with open-source products such as Nessus
®
.
Most vendors prefer not to offer software-only solutions because they
are difficult to support on a large user base with large variations in
the hardware. A well-controlled hardware platform will provide more
consistent performance and predictable behavior, enabling vendors to
squeeze out all the necessary performance for the product and meet
customer expectations. is will become more apparent later when we
discuss the operating details of a vulnerability assessment too ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512