Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Back to School Savings: Save up to 30% on print books and eBooks. No promo code needed.
Back to School Savings: Save up to 30%
2nd Edition - May 21, 2008
Editor: Russ Rogers
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus… Read more
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized access.Obtain and Install NessusInstall from source or binary, set up up clients and user accounts, and update your plug-ins.Modify the Preferences TabSpecify the options for Nmap and other complex, configurable components of Nessus.Understand Scanner Logic and Determine Actual RiskPlan your scanning strategy and learn what variables can be changed.Prioritize VulnerabilitiesPrioritize and manage critical vulnerabilities, information leaks, and denial of service errors.Deal with False PositivesLearn the different types of false positives and the differences between intrusive and nonintrusive tests.Get Under the Hood of NessusUnderstand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).Scan the Entire Enterprise NetworkPlan for enterprise deployment by gauging network bandwith and topology issues.
Chapter 1. Vulnerability Assessment
Chapter 2. Introducing Nessus
Chapter 3. Installing Nessus
Chapter 4. Running Your First Scan
Chapter 5. Interpreting Results
Chapter 6. Vulnerability Types
Chapter 7. False Positives
Chapter 8. Under the Hood
Chapter 9. The Nessus Knowledge Base
Chapter 10. Enterprise Scanning
Chapter 11. NASL
Chapter 12. The Nessus User Community
Chapter13. Compliance Monitoring with Nessus 3
RR