Chapter 11. Tying It All Together

Introduction

This chapter should tie vulnerability management procedures together nicely and give you a concise guide. Concepts, examples, and product screen shots aside, we want readers to literally tear this chapter from the book and keep it handy on their desks as a comprehensive methodology checklist ...

Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.