Unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system, this book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches.
Unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system, this book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches.