Nessus Network Auditing
Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson
- 出版商: Syngress Media
- 出版日期: 2004-08-03
- 售價: $2,000
- 貴賓價: 9.5 折 $1,900
- 語言: 英文
- 頁數: 550
- 裝訂: Paperback
- ISBN: 1931836086
- ISBN-13: 9781931836081
已過版
買這商品的人也買了...
-
$1,400$1,330 -
$580$458 -
$775Ethereal Packet Sniffing
-
$650$553 -
$780$741 -
$590$466 -
$750$675 -
$560$504 -
$480$379 -
$750$593 -
$780$663 -
$490$382 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$580$452 -
$1,580$1,501 -
$675LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$2,340$2,223 -
$650$553 -
$650$507 -
$450$405 -
$1,881$1,782 -
$580$452 -
$620$527 -
$650$507 -
$2,340$2,223
相關主題
商品描述
Description:
The ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus project founder Renaud Deraison and a team of leading developers have created the definitive book for the Nessus community.
- Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.- Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.- Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.- Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.- Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.- Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.- Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).- Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.Your Solutions Membership Gives You Access to:
- Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page
- "From the Author" Forum where the authors post timely updates and links to related sites
- The complete code listings from the book
- These downloadable e-booklets:
- Dealing with the Data: Snort 2.1 Intrusion Detection
- Introducing Ethereal: Ethereal Packet Sniffing
- Defining Perimeter and Internal Segments: Security Sage's Guide to Hardening Network Infrastructure
- Seattle, Washington: The Mezonic Agenda: Hacking the Presidency