Learn about this open-source vulnerability scanner, how to get the most out of the tool, recognize its limitations and how to deal with them, and what makes it flexible to perform a wide range of network-based operations
security auditingWhen the first edition of this book was published (October 1998), it seemed as if the biggest risks organizations faced were insider abuse, hacking, viruses, and the Year 2000 problem. The newspapers were flooded daily with stories
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have