LEADER 02881nam 2200661Ia 450 001 9910451868903321 005 20200520144314.0 010 $a1-281-20916-3 010 $a9786611209162 010 $a1-57441-388-0 010 $a1-4337-1037-4 010 $a1-4356-2459-9 035 $a(CKB)1000000000482402 035 $a(EBL)316091 035 $a(OCoLC)187394840 035 $a(SSID)ssj0000388836 035 $a(PQKBManifestationID)11280106 035 $a(PQKBTitleCode)TC0000388836 035 $a(PQKBWorkID)10443102 035 $a(PQKB)10718166 035 $a(MiAaPQ)EBC316091 035 $a(Au-PeEL)EBL316091 035 $a(CaPaEBR)ebr10331580 035 $a(OCoLC)780889400 035 $a(EXLCZ)991000000000482402 100 $a20020116d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSavage frontier$b[electronic resource] $erangers, riflemen, and Indian wars in Texas$hVolume 3$i1840-1841 /$fStephen L. Moore 210 $aDenton $cUniversity of North Texas Press$dc2007 215 $a1 online resource (449 p.) 225 1 $aSavage Frontier, 3 300 $aDescription based upon print version of record. 311 $a1-57441-228-0 320 $aIncludes bibliographical references and index. 327 $aPrologue; 1. THE COMANCHES; 2. THE COUNCIL HOUSE FIGHT; 3. SPRING EXPEDITIONS; 4. THE GREAT COMANCHE RAID; 5. ""IF WE CAN'T WHIP 'EM, WE CAN TRY!""; 6. MOORE'S COMANCHE VILLAGE RAID; 7. THE GREAT MILITARY ROAD; 8. THE NEW FRONTIER ""MINUTEMEN""; 9. THE LEWIS EXPEDITION; 10. THE VILLAGE CREEK EXPEDITION; 11. ""ACTIVE AND ENERGETIC MEASURES""; 12. THE GULF COAST MINUTEMEN; 13. ""BRAVO TOO MUCH""; 14. ENCHANTED ROCK AND BIRD'S FORT; AFTERWORD; APPENDIX A; APPENDIX B; CHAPTER NOTES; BIBLIOGRAPHY; INDEX 330 $aPart of the ""Savage Frontier"" series, this work focuses on the evolution of the Texas Rangers and frontier warfare in Texas during the years 1840 and 1841. It covers the resulting Battle of Plum Creek and other engagements in detail. It also shows how the Colt repeating pistol came into use by Texas Rangers. 410 0$aSavage Frontier, 3 606 $aIndians of North America$xWars$zTexas 606 $aIndians of North America$zTexas$xGovernment relations 606 $aFrontier and pioneer life$zTexas$xHistory 607 $aTexas$xPolitics and government$y1836-1846 608 $aElectronic books. 615 0$aIndians of North America$xWars 615 0$aIndians of North America$xGovernment relations. 615 0$aFrontier and pioneer life$xHistory. 676 $a976.404 700 $aMoore$b Stephen L$0862127 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451868903321 996 $aSavage frontier$91924520 997 $aUNINA LEADER 02535nam 2200565Ia 450 001 9910782958903321 005 20230120004102.0 010 $a1-281-05587-5 010 $a9786611055875 010 $a0-08-047962-6 035 $a(CKB)1000000000005508 035 $a(EBL)294281 035 $a(OCoLC)191034990 035 $a(SSID)ssj0000076757 035 $a(PQKBManifestationID)11115916 035 $a(PQKBTitleCode)TC0000076757 035 $a(PQKBWorkID)10038433 035 $a(PQKB)11408543 035 $a(MiAaPQ)EBC294281 035 $a(Au-PeEL)EBL294281 035 $a(CaPaEBR)ebr10065781 035 $a(CaONFJC)MIL105587 035 $a(EXLCZ)991000000000005508 100 $a20030710d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNessus network auditing$b[electronic resource] /$fJay Beale 210 $aRockland, MA $cSyngress$dc2004 215 $a1 online resource (545 p.) 300 $aDescription based upon print version of record. 311 $a1-931836-08-6 327 $aCover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index 330 $aThis book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no 606 $aComputer networks$xAuditing 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xAuditing. 615 0$aComputer networks$xSecurity measures. 676 $a004.6 676 $a005.8 700 $aBeale$b Jay$0627575 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782958903321 996 $aNessus network auditing$93723267 997 $aUNINA