WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/1106193756

Nessus network auditing

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison."@en
  • "The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.* Perform a Vulnerability AssessmentUse Nessus to find progr."
  • "This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network."@en
  • "Crackers constantly probe machines looking for both old and new vulnerabilities. In order to avoid becoming a casualty of a casual cracker, savvy sys admins audit their own machines before they're probed by hostile outsiders (or even hostile insiders). Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison."@en
  • "The first edition of Nessus sold just under 10,000 units worldwide."@en
  • "This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented."
  • "Nessus is a security scanner that remotely audits a network and determines whether it is subject to being cracked or otherwise compromised. This book shows readers how to install, configure and optimize Nessus."
  • "This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is pluginbased, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly underdocumented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented"
  • "The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison."

http://schema.org/genre

  • "Electronic books"@en
  • "Electronic books"
  • "Ressources internet"
  • "Livres électroniques"
  • "Llibres electrònics"

http://schema.org/name

  • "Nessus network auditing Title from title screen"
  • "Nessus network auditing"@en
  • "Nessus network auditing"
  • "Nessus network auditing Includes index"
  • "Nessus network auditing, second edition"@en
  • "Nessus Network Auditing"
  • "Nessus Network Auditing"@en
  • "Nessus network auditing Previous ed.: 2004"

http://schema.org/workExample