๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Nessus Network Auditing

โœ Scribed by Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson


Publisher
Syngress
Year
2004
Tongue
English
Leaves
545
Series
Jay Beale's Open Source Security
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented"


๐Ÿ“œ SIMILAR VOLUMES


Nessus Network Auditing
โœ Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnst ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Syngress ๐ŸŒ English

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and AS

Nessus Network Auditing
โœ Russ Rogers ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Syngress ๐ŸŒ English

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a

Nessus Network Auditing, Second Edition
โœ Russ Rogers ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de

Nessus Network Auditing, Second Edition
โœ Russ Rogers ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de

Network Security Auditing
โœ Chris Jackson ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Prentice Hall ๐ŸŒ English

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. ย  Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, incl

Network security auditing
โœ Chris Jackson ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Cisco Press ๐ŸŒ English

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, includi