Book description
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues.
- Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
- The first edition is still the only book available on the product.
- Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Technical Editor
- Contributing Authors
- Chapter 1. Vulnerability Assessment
- Chapter 2. Introducing Nessus
- Chapter 3. Installing Nessus
- Chapter 4. Running Your First Scan
- Chapter 5. Interpreting Results
- Chapter 6. Vulnerability Types
- Chapter 7. False Positives
- Chapter 8. Under the Hood
- Chapter 9. The Nessus Knowledge Base
- Chapter 10. Enterprise Scanning
- Chapter 11. NASL
- Chapter 12. The Nessus User Community
- Chapter13. Compliance Monitoring with Nessus 3
- Index
Product information
- Title: Nessus Network Auditing, 2nd Edition
- Author(s):
- Release date: October 2011
- Publisher(s): Syngress
- ISBN: 9780080558653
You might also like
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground …
book
Nmap Network Exploration and Security Auditing Cookbook - Third Edition
A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT …
book
Network Security Assessment, 3rd Edition
How secure is your network? The best way to find out is to attack it, using …