eBooks-it.org Logo
eBooks-IT.org Inner Image

Nessus Network Auditing

2nd Edition
Nessus Network Auditing Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Mark Carey
Edition:2
ISBN-10:1597492086
ISBN-13:9781597492089
Pages:433
Published:May 27 2008
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:10.44 MB

Book Description:

The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.* Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized access.* Obtain and Install NessusInstall from source or binary, set up up clients and user accounts, and update your plug-ins.* Modify the Preferences TabSpecify the options for Nmap and other complex, configurable components of Nessus.* Understand Scanner Logic and Determine Actual RiskPlan your scanning strategy and learn what variables can be changed.* Prioritize VulnerabilitiesPrioritize and manage critical vulnerabilities, information leaks, and denial of service errors.* Deal with False PositivesLearn the different types of false positives and the differences between intrusive and nonintrusive tests.* Get Under the Hood of NessusUnderstand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).* Scan the Entire Enterprise NetworkPlan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.* The first edition is still the only book available on the product.* Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

Download Link:

Related Books:

NESSUS Network Auditing

NESSUS Network Auditing Image
This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1,200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. Ness...

Nmap 6

Network Exploration and Security Auditing Cookbook
Nmap 6 Image
Want to master Nmap and its scripting engine? Then this book is for you packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth. Overview Master the power of Nmap 6 Learn how the Nmap Scripting Engine works and develop your own scripts! 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description What will you learn Master the basic scanning techniques for port scanning and host discovery. Implement your own host monitoring system with Nmap Perform security checks to web applications, mail servers and databases Learn to gather interesting host information not included in a typical scan Tune scans to optimiz...

Nessus, Snort & Ethereal Power Tools

Customizing Open Source Security Applications
Nessus, Snort & Ethereal Power Tools Image
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts th...



2007 - 2021 © eBooks-IT.org