Nessus Compliance Checks Auditing System Configurations and Content February 5, 2013 (Revision 64) Table of Contents Introduction .........................................................................................................................................…
1. Never Fight A Land War in Cyberspace: The Best Defense is a strong Defense Marcus J. Ranum ([email protected]) For you twits: @mjranum Marcus works for Tenable Network Security,…
A study of network vulnerability in embedded devices T. Sugimoto, M. Ishii, T. Masuda, T. Ohata, T. Sakamoto, and R. Tanaka Japan Synchrotron Radiation Research Institute…