02535nam 2200565Ia 450 991078295890332120230120004102.01-281-05587-597866110558750-08-047962-6(CKB)1000000000005508(EBL)294281(OCoLC)191034990(SSID)ssj0000076757(PQKBManifestationID)11115916(PQKBTitleCode)TC0000076757(PQKBWorkID)10038433(PQKB)11408543(MiAaPQ)EBC294281(Au-PeEL)EBL294281(CaPaEBR)ebr10065781(CaONFJC)MIL105587(EXLCZ)99100000000000550820030710d2004 uy 0engur|n|---|||||txtccrNessus network auditing[electronic resource] /Jay BealeRockland, MA Syngressc20041 online resource (545 p.)Description based upon print version of record.1-931836-08-6 Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; IndexThis book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no Computer networksAuditingComputer networksSecurity measuresComputer networksAuditing.Computer networksSecurity measures.004.6005.8Beale Jay627575MiAaPQMiAaPQMiAaPQBOOK9910782958903321Nessus network auditing3723267UNINA