Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
teChnology 101
because more than one of these processes can run simultaneously.
en, the process on the left side repeats.
is target scanning process continues until the process runs out of
hosts to scan or the maximum number of simultaneous target scans is
reached. When the maximum number of target scans is reached, the
process waits until there is room for another instance. When the end
of target data (EOD) is reached, the process terminates. en, sub-
sequent data collection and reporting activities begin. ose future
activities will wait until all target scanning processes have com-
pleted—reach zero—before reporting all results.
e ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512