LEADER 01011nam--2200373---450- 001 990000463600203316 005 20050422145339.0 035 $a0046360 035 $aUSA010046360 035 $a(ALEPH)000046360USA01 035 $a0046360 100 $a20010523d1972----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aMaestri del cinema$fPietro Bianchi 210 $aMilano$cGarzanti$d[1972] 215 $a366 p.$d18 cm 225 2 $aI Garzanti 410 $12001$aI Garzanti 461 1$1001-------$12001 676 $a791.43 700 1$aBIANCHI,$bPietro$039665 801 0$aIT$bsalbc$gISBD 912 $a990000463600203316 951 $aXIII.2. 433(XVI D 12)$b138106$cXVI D 959 $aBK 969 $aUMA 979 $aPATTY$b90$c20010523$lUSA01$h1143 979 $c20020403$lUSA01$h1655 979 $aPATRY$b90$c20040406$lUSA01$h1632 979 $aCOPAT2$b90$c20050422$lUSA01$h1453 996 $aMaestri del cinema$9307933 997 $aUNISA LEADER 02535nam 2200565Ia 450 001 9910782958903321 005 20230120004102.0 010 $a1-281-05587-5 010 $a9786611055875 010 $a0-08-047962-6 035 $a(CKB)1000000000005508 035 $a(EBL)294281 035 $a(OCoLC)191034990 035 $a(SSID)ssj0000076757 035 $a(PQKBManifestationID)11115916 035 $a(PQKBTitleCode)TC0000076757 035 $a(PQKBWorkID)10038433 035 $a(PQKB)11408543 035 $a(MiAaPQ)EBC294281 035 $a(Au-PeEL)EBL294281 035 $a(CaPaEBR)ebr10065781 035 $a(CaONFJC)MIL105587 035 $a(EXLCZ)991000000000005508 100 $a20030710d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNessus network auditing$b[electronic resource] /$fJay Beale 210 $aRockland, MA $cSyngress$dc2004 215 $a1 online resource (545 p.) 300 $aDescription based upon print version of record. 311 $a1-931836-08-6 327 $aCover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index 330 $aThis book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no 606 $aComputer networks$xAuditing 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xAuditing. 615 0$aComputer networks$xSecurity measures. 676 $a004.6 676 $a005.8 700 $aBeale$b Jay$0627575 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782958903321 996 $aNessus network auditing$93723267 997 $aUNINA