Help me a way out.

I would like to know how does a vulnerabiliy scanner work???

I have gooled on this. I am not much satisfied with the content. I would like to know A-Z about the vulnerabiliy testing and the scanners role at work.

Any URLs and references in this regard are highly appreciated.