Nessus Network Auditing: Edition 2

· Elsevier
4.5
4条评价
电子书
448
符合条件
评分和评价未经验证  了解详情

关于此电子书

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized access.Obtain and Install NessusInstall from source or binary, set up up clients and user accounts, and update your plug-ins.Modify the Preferences TabSpecify the options for Nmap and other complex, configurable components of Nessus.Understand Scanner Logic and Determine Actual RiskPlan your scanning strategy and learn what variables can be changed.Prioritize VulnerabilitiesPrioritize and manage critical vulnerabilities, information leaks, and denial of service errors.Deal with False PositivesLearn the different types of false positives and the differences between intrusive and nonintrusive tests.Get Under the Hood of NessusUnderstand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).Scan the Entire Enterprise NetworkPlan for enterprise deployment by gauging network bandwith and topology issues. - Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. - The first edition is still the only book available on the product. - Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

评分和评价

4.5
4条评价

作者简介

Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).

为此电子书评分

欢迎向我们提供反馈意见。

如何阅读

智能手机和平板电脑
只要安装 AndroidiPad/iPhone 版的 Google Play 图书应用,不仅应用内容会自动与您的账号同步,还能让您随时随地在线或离线阅览图书。
笔记本电脑和台式机
您可以使用计算机的网络浏览器聆听您在 Google Play 购买的有声读物。
电子阅读器和其他设备
如果要在 Kobo 电子阅读器等电子墨水屏设备上阅读,您需要下载一个文件,并将其传输到相应设备上。若要将文件传输到受支持的电子阅读器上,请按帮助中心内的详细说明操作。