Jump to ratings and reviews
Rate this book

Practical Vulnerability Management

Rate this book
A hands-on guide to improving an organization's computer security and developing scanning tools on a budget.

Practical Vulnerability Management discusses the components of a vulnerability management program and shows the reader how to build a free or low-cost system to automatically handle the repetitive aspects of vulnerability management. Vulnerability management is a critical and sometimes neglected aspect of information security. It consists of two main parts: awareness and action. First, the security practitioner must be aware of the vulnerabilities that exist in an organization's systems and understand how dangerous each one is. Second, that information must feed into an ongoing process of addressing vulnerabilities by updating the vulnerable systems or otherwise mitigating their severity.

270 pages, Paperback

Published July 7, 2020

23 people are currently reading
72 people want to read

About the author

Andrew Magnusson

3 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (16%)
4 stars
18 (50%)
3 stars
10 (27%)
2 stars
1 (2%)
1 star
1 (2%)
Displaying 1 - 3 of 3 reviews
1 review
March 9, 2025
There's some decent fundamental information in this book about vulnerability management, but it just misses the mark of what it portends to be given the title, front/back cover, and associated descriptions. There's not much practical about anything in there, and of what is, it was out-of-date by the time the book was published, which affects most books and other information sources in the technology and security world. I think we do need more treatises on vulnerability management (and today, also referenced as exposure management, among other buzzwords) as the current ones either purposefully or unknowingly miss or dance around the root problems that plague those programs that are generally unsuccessful. While there are always better ways to detect vulnerabilities, exposures, and/or any other entity that we might claim presents some level of risk from a technical standpoint, the "detection" part of VM/EM has generally been solved, at a conceptual high level at least. The difficult, and in my opinion, complex issues that prevent VM/EM programs from realizing success are less tangible than some notional VM/EM circular/recurring process that one might find in some marketing material or the like. I will just state it like this, for the sake of brevity: at least up front, generally speaking, nobody cares if a security practitioner has found one million "vulnerabilities" or a thousand, or whatever. All that data looks cool in the detection tools, sure. However, without alignment to an organization's mission or vision, and/or its critical function(s) clearly articulated in a recurring and understandable fashion, VM/EM success will be nearly impossible to obtain. I would argue that books (emphasis: plural) could and should be written diving deep into those last two sentences alone. This one just doesn't even approach anything of the sort.
Profile Image for mirror.
434 reviews
July 15, 2024
straightforward, textbook
this was a helpful overview on how to approach vulnerability management, felt comprehensive while not being bloated w useless information
the hands on portion helped see how to put the theoretical parts together
Profile Image for Nigele McCoy.
6 reviews
August 15, 2025
Very simplified approach to explaining vulnerability management. The part 2 of the book is interesting and is a nice project to understand the inner workings on how commercial vulnerability management software works. Very easy and simplified read.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.