02569nam 2200577Ia 450 991045001240332120200520144314.01-281-05587-597866110558750-08-047962-6(CKB)1000000000005508(EBL)294281(OCoLC)191034990(SSID)ssj0000076757(PQKBManifestationID)11115916(PQKBTitleCode)TC0000076757(PQKBWorkID)10038433(PQKB)11408543(MiAaPQ)EBC294281(Au-PeEL)EBL294281(CaPaEBR)ebr10065781(CaONFJC)MIL105587(EXLCZ)99100000000000550820030710d2004 uy 0engur|n|---|||||txtccrNessus network auditing[electronic resource] /Jay BealeRockland, MA Syngressc20041 online resource (545 p.)Description based upon print version of record.1-931836-08-6 Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; IndexThis book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no Computer networksAuditingComputer networksSecurity measuresElectronic books.Computer networksAuditing.Computer networksSecurity measures.004.6005.8Beale Jay627575MiAaPQMiAaPQMiAaPQBOOK9910450012403321Nessus network auditing1941572UNINA