LEADER 03090cam a2200409Ii 4500 001 991003255109707536 006 m d 007 cr cn||||||||| 008 070806s2004 maua s 001 0 eng d 020 $a9781931836081 020 $a1931836086 035 $ab13656211-39ule_inst 037 $a106113:106144$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aNessus network auditing$h[electronic resource] /$cRenaud Deraison ... [et al.]. 260 $aRockland, MA. :$bSyngress,$cc2004. 300 $axxix, 508 p. :$bill. ;$c24 cm. +$e1 computer optical disc (4 3/4 in.). 440 0$aJay Beale's open source security series 500 $aIncludes index. 520 $aThis book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks. 650 0$aInformation networks$xSecurity measures. 650 0$aComputer security. 655 7$aElectronic books.$2local 700 1 $aDeraison, Renaud.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739074 710 2 $aSyngress Media, Inc. 776 1 $cOriginal$z1931836086$z9781931836081$w(OCoLC)67836676 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781931836081$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656211$b24-02-22$c24-01-08 912 $a991003255109707536 994 $aC0$bTEF 996 $aNessus network auditing$91464024 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0