Nessus Network Auditing

Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson

  • 出版商: Syngress Media
  • 出版日期: 2004-08-03
  • 售價: $1,900
  • 貴賓價: 9.5$1,805
  • 語言: 英文
  • 頁數: 550
  • 裝訂: Paperback
  • ISBN: 1931836086
  • ISBN-13: 9781931836081
  • 已過版

買這商品的人也買了...

商品描述

Description:

The ONLY Book to Read if You Run Nessus Across the Enterprise

Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus project founder Renaud Deraison and a team of leading developers have created the definitive book for the Nessus community.

  • Perform a Vulnerability Assessment
    Use Nessus to find programming errors that allow intruders to gain unauthorized access.
  • Obtain and Install Nessus
    Install from source or binary, set up up clients and user accounts, and update your plug-ins.
  • Modify the Preferences Tab
    Specify the options for Nmap and other complex, configurable components of Nessus.
  • Understand Scanner Logic and Determine Actual Risk
    Plan your scanning strategy and learn what variables can be changed.
  • Prioritize Vulnerabilities
    Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
  • Deal with False Positives
    Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
  • Get Under the Hood of Nessus
    Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
  • Scan the Entire Enterprise Network
    Plan for enterprise deployment by gauging network bandwith and topology issues.

Your Solutions Membership Gives You Access to:

  • Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page
  • "From the Author" Forum where the authors post timely updates and links to related sites
  • The complete code listings from the book
  • These downloadable e-booklets:
    • Dealing with the Data: Snort 2.1 Intrusion Detection
    • Introducing Ethereal: Ethereal Packet Sniffing
    • Defining Perimeter and Internal Segments: Security Sage's Guide to Hardening Network Infrastructure
    • Seattle, Washington: The Mezonic Agenda: Hacking the Presidency