Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
exeCution, rePorting, and analysis 233
higher vulnerability scores, possibly from greater complexity. In many
cases, such a pattern is due to an engineering or security staff that was
ill-prepared for the net assets. An examination of the remediation effort
and the specific vulnerabilities affecting the host is in order.
7.6 Active Scanning: Scheduling and Resources
When using active scanners either with agents or appliances, the pro-
cess of scheduling and resource management can be critical. When
an active scan of a network segment is performed, as previously dis-
cussed, there are impacts on networks, targets, various infrastructure
components, and possibly, by extension, business operations. In order
to properly manage these factors, a cer ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512