Chapter 10: Interacting with the Vulnerabilities Scanner