Design and Deployment of a Rapid Response Security Vulnerability Scanning Infrastructure

A large research university presents a formidable challenge to computer security professionals. Among the hazards are a completely porous, non firewalled border and decentralized administration of computers. Considerable emphasis and effort is hence placed on proactive vulnerability scanning in an...
By Eliot Lim
June 9, 2004

All papers are copyrighted. No re-posting of papers is permitted