Malware Can Spread Through Software Updates
The Importance Of Using A Vulnerability Scanner For Security
Unobtrusive Mapping of Network
Purpose of Scanning the Network: Stealth Attacks