i have a question. when searching for vulnerabilitys in systems, such as on the ICAT Vulnerability Database what is the best way to interpit the results.... i somewhat understand it but sometimes is really hard to interpit, what can i study to better increase my knowlege on security????