Nessus Network Auditing

Nessus Network Auditing
ISBN-10
0080558658
ISBN-13
9780080558653
Category
Computers
Pages
448
Language
English
Published
2011-10-13
Publisher
Elsevier
Author
Russ Rogers

Description

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. The first edition is still the only book available on the product. Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Other editions

Similar books

  • Nessus Network Auditing (Book / CD-ROM)
    By Jay Beale

    Nessus Network Auditing (Book / CD-ROM)

  • Hack Attacks Testing: How to Conduct Your Own Security Audit
    By John Chirillo

    Command line instructions: At the command prompt type: mount /dev/cdrom /mnt/cdrom (This will mount the “cdrom” device to the mnt/cdrom directory. ... The companion CD-ROM contains an interactive workbook for the text.

  • Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications
    By Gilbert Ramirez, Jay Beale, Brian Caswell

    ... the Snort core team, where he is the primary author for the world's most widely used intrusion detection rulesets. ... Snort 2.0 Intrusion Detection (Syngress, ISBN: 1-931836-74-4), and Snort 2.1 Intrusion Detection, Second Edition ...

  • Host Integrity Monitoring Using Osiris and Samhain
    By Brian Wotring

    “The authors of this Snort 2.1 Intrusion Detection, Second Edition have produced a book with a simple focus, to teach you how to use Snort, from the basics of getting started to advanced rule configuration, they cover all aspects of ...

  • Secure Your Network for Free
    By Eric Seagren

    ... Nessus on Windows The installation of Nessus is straightforward . You will need to select the instal- lation target directory and accept the license agreement . For an excellent ref- erence on Nessus see Nessus Network Auditing ...

  • Network Security Assessment: From Vulnerability to Patch
    By Andrew Gold, Steve Manzuik, Ken Pfeil

    **o-CTET - AvailABLE NOW $nort 2.1 Intrusion Detection, o,.... second Edition - - Jay Beale, Brian Caswell, et al. The authors of this Snort 2.1 Intrusion Detection, Second Edition have produced a - - book with a simple focus, ...

  • Network Security Auditing
    By Chris Jackson

    This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.

  • WarDriving and Wireless Penetration Testing
    By Russ Rogers, Brian Baker, Frank Thornton

    ISBN : 1-59749-021-0 Price : $ 59.95 US $ 83.95 CAN OPEN SOURCE TOOLKIT the M RSS de Werso Masoner Sohnny Long mo Chee M Google Hacking AVAILABLE NOW Google Hacking for Penetration Testers order ...

  • Firewall Policies and VPN Configurations
    By Jennifer Davis, Syngress, Dale Liu

    —Clinton C. Brooks, Senior Advisor for Homeland Security and Asst. Deputy Director NSA "WOW! You eloquently express thoughts and ideas that I feel. You have helped me, not so much fear down barriers to communication, as to leverage ...

  • Building Robots with LEGO Mindstorms NXT
    By Mario Ferrari, Guilio Ferrari

    In the rest of the chapter, we will explore some methods for implementing absolute and relative positioning in NXT robots. It's up to you to decide whether or not to use any one of them or a combination in your applications.