eBooks-it.org Logo
eBooks-IT.org Inner Image

NESSUS Network Auditing

NESSUS Network Auditing Image

Book Details:

Publisher:Syngress Media,U.S.
Series: Syngress
Author:Renaud Deraison
Edition:1
ISBN-10:1931836086
ISBN-13:9781931836081
Pages:550
Published:Oct 14 2004
Posted:Sep 19 2015
Language:English
Book format:PDF
Book size:4.62 MB

Book Description:

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1,200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the 'most popular' open source security tool of any kind. This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. The dramatic success of Syngress' Snort 2.0 Intrusion Detection clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented.

Download Link:

Related Books:

Nessus Network Auditing

Nessus Network Auditing Image
2nd Edition
The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.* Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized acce...

Nmap 6

Network Exploration and Security Auditing Cookbook
Nmap 6 Image
Want to master Nmap and its scripting engine? Then this book is for you packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth. Overview Master the power of Nmap 6 Learn how the Nmap Scripting Engine works and develop your own scripts! 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description What will you learn Master the basic scanning techniques for port scanning and host discovery. Implement your own host monitoring system with Nmap Perform security checks to web applications, mail servers and databases Learn to gather interesting host information not included in a typical scan Tune scans to optimiz...

Nessus, Snort & Ethereal Power Tools

Customizing Open Source Security Applications
Nessus, Snort & Ethereal Power Tools Image
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts th...



2007 - 2021 © eBooks-IT.org