Nessus Network Auditing: Jay Beale Open Source Security SeriesElsevier, 2004. gada 14. okt. - 550 lappuses This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented. |
No grāmatas satura
1.–5. rezultāts no 88.
i. lappuse
... Once you have registered, you will enjoy several benefits, including: □ Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format. They have been selected by our editors ...
... Once you have registered, you will enjoy several benefits, including: □ Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format. They have been selected by our editors ...
6. lappuse
... once. Host. Assessments. Host assessment tools were one of the first proactive security measures available to system administrators and are still in use today.These tools require that the assessment software be installed on each system ...
... once. Host. Assessments. Host assessment tools were one of the first proactive security measures available to system administrators and are still in use today.These tools require that the assessment software be installed on each system ...
9. lappuse
... Once the addresses are specified, the interface will often present the user with a set of configuration options for the assessment; this could include the port ranges to scan, the bandwidth settings to use, or any product-specific ...
... Once the addresses are specified, the interface will often present the user with a set of configuration options for the assessment; this could include the port ranges to scan, the bandwidth settings to use, or any product-specific ...
10. lappuse
... Once the host detection and identification steps are complete, the next stage is normally a port scan.A port scan is the process of determining what TCP and UDP services are open on a given system.TCP port scans www.syngress.com 10 ...
... Once the host detection and identification steps are complete, the next stage is normally a port scan.A port scan is the process of determining what TCP and UDP services are open on a given system.TCP port scans www.syngress.com 10 ...
12. lappuse
... Once the service detection phase is complete, the next step is to determine the actual application in use for each detected service.The goal of this stage is to identify the vendor, type, and version of every service detected in the ...
... Once the service detection phase is complete, the next step is to determine the actual application in use for each detected service.The goal of this stage is to identify the vendor, type, and version of every service detected in the ...
Saturs
1 | |
27 | |
45 | |
Running Your First Scan | 85 |
Interpreting Results | 133 |
Vulnerability Types | 187 |
False Positives | 211 |
Under the Hood | 239 |
The Nessus Knowledge Base | 271 |
Enterprise Scanning | 295 |
NASL | 363 |
The Nessus User Community | 399 |
The NASL2 Reference Manual | 423 |
Utilizing Domain Credentials to Enhance Nessus Scans | 487 |
Index | 497 |
Citi izdevumi - Skatīt visu
Nessus Network Auditing: Jay Beale Open Source Security Series Jay Beale,Haroon Meer,Charl van der Walt,Renaud Deraison Ierobežota priekšskatīšana - 2004 |
Bieži izmantoti vārdi un frāzes
actually addition administrator affect allows application argument assessment attack authors banner called cause chapter client command complete configuration connection consider contains create database default dependencies detect determine enable example execute exist exploit false positives Figure format function host identify important install issues Knowledge Base launched look machine mailing NASL Nessus Note Once operating option packet password perform plugin port port scanner possible problem protocol Questions received remote request response returns risk scan scanner script server simply specified stored string takes understand update vulnerability Windows write written