Unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system, this book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches.
Read More
Unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system, this book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches.
Read Less