Pro+ Content/E-Books

Thank you for joining!
Access your Pro+ Content below.
June 2010

Security vulnerability management tutorial

Sponsored by SearchSecurity.com

SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

Table Of Contents

  • Vulnerability test methods for application security assessments
  • Effectively using vulnerability management data
  • What to do with network penetration test results
  • Determine your Microsoft Windows patch level
  • Assess your security state in five steps

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close