
Nessus Network Auditing
4 free booklets your solutions membership
Renaud Deraison - Collection Jay Beale's Open Source Security Series
Résumé
The ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus project founder Renaud Deraison and a team of leading developers have created the definitive book for the Nessus community.
- Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access. - Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins. - Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus. - Understand Scanner Logic and Determine Actual
Risk
Plan your scanning strategy and learn what variables can be changed. - Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. - Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests. - Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). - Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
Your Solutions Membership Gives You Access to:
- Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page
- "From the Author" Forum where the authors post timely updates and links to related sites
- The complete code listings from the book
- These downloadable e-booklets:
- Dealing with the Data: Snort 2.1 Intrusion Detection
- Introducing Ethereal: Ethereal Packet Sniffing
- Defining Perimeter and Internal Segments: Security Sage's Guide to Hardening Network Infrastructure
- Seattle, Washington: The Mezonic Agenda: Hacking the Presidency
L'auteur - Renaud Deraison
Contributor, Founder of The Nessus Project.
Sommaire
- Vulnerability Assessment
- Introducing Nessus
- Installing Nessus
- Running Your First Scan
- Interpreting Results
- Vulnerability Types
- False Positives
- Under the Hood
- The Nessus Knowledge Base
- Enterprise Scanning
- NASL
- The Nessus User Community
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Renaud Deraison |
Collection | Jay Beale's Open Source Security Series |
Parution | 28/10/2004 |
Nb. de pages | 508 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 883g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836081 |
ISBN13 | 978-1-931836-08-1 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet