Nessus Network Auditing: Jay Beale Open Source Security SeriesElsevier, 2004. gada 14. okt. - 550 lappuses This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented. |
Saturs
1 | |
27 | |
45 | |
Running Your First Scan | 85 |
Interpreting Results | 133 |
Vulnerability Types | 187 |
False Positives | 211 |
Under the Hood | 239 |
The Nessus Knowledge Base | 271 |
Enterprise Scanning | 295 |
NASL | 363 |
The Nessus User Community | 399 |
The NASL2 Reference Manual | 423 |
Utilizing Domain Credentials to Enhance Nessus Scans | 487 |
Index | 497 |
Citi izdevumi - Skatīt visu
Nessus Network Auditing: Jay Beale Open Source Security Series Jay Beale,Haroon Meer,Charl van der Walt,Renaud Deraison Ierobežota priekšskatīšana - 2004 |
Bieži izmantoti vārdi un frāzes
actually addition administrator affect allows application argument assessment attack authors banner called cause chapter client command complete configuration connection consider contains create database default dependencies detect determine enable example execute exist exploit false positives Figure format function host identify important install issues Knowledge Base launched look machine mailing NASL Nessus Note Once operating option packet password perform plugin port port scanner possible problem protocol Questions received remote request response returns risk scan scanner script server simply specified stored string takes understand update vulnerability Windows write written