Nessus Network Auditing, 2/e (Paperback)
- 出版商: Syngress
- 出版日期: 2008-05-27
- 售價: $1,584
- 語言: 英文
- 頁數: 433
- 裝訂: Paperback
- ISBN: 1597492086
- ISBN-13: 9781597492089
立即出貨 (庫存 < 3)
貴賓價: $2,530Snort Intrusion Detection and Prevention Toolkit (Paperback)
貴賓價: $1,534Network Performance Toolkit: Using Open Source Testing Tools (Paperback)
貴賓價: $1,330Network Security with OpenSSL (Paperback)
貴賓價: $1,610Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Paperback)
售價: $299NFS Illustrated (Hardcover)
售價: $1,320DNS and BIND, 5/e (Paperback)
售價: $1,050sendmail, 4/e (Paperback)
貴賓價: $1,490SSH, The Secure Shell: The Definitive Guide, 2/e (Paperback)
貴賓價: $1,337Kerberos : The Definitive Guide (Paperback)
售價: $825Active Directory: Designing, Deploying, and Running Active Directory, 4/e (Paperback)
售價: $850Practical Packet Analysis, 2/e : Using Wireshark to Solve Real-World Network Problems (Paperback)
貴賓價: $1,330Postfix: The Definitive Guide (Paperback)
貴賓價: $1,568Network Warrior, 2/e (Paperback)
售價: $1,120LDAP System Administration (Paperback)
售價: $199Using SANs and NAS
The Updated Version of the Bestselling Nessus Book.
This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.
* Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.
* Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.
* Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.
* Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.
* Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
* Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
* Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
* Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
* Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
* The first edition is still the only book available on the product.
* Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison.