Cart
Free US shipping over $10
Proud to be B-Corp

Nessus Network Auditing Russ Rogers (Penetration Tester for a Federal Agency and Co-founderChief Executive Officer, Peak Security, Inc.)

Nessus Network Auditing By Russ Rogers (Penetration Tester for a Federal Agency and Co-founderChief Executive Officer, Peak Security, Inc.)

Summary

Shows how you can perform a vulnerability assessment, use Nessus to find programming errors that allow intruders to gain unauthorized access, and obtain and install Nessus Install from source or binary. This book also shows how to set up clients and user accounts, update your plug-ins, and modify the Preferences Tab.

Nessus Network Auditing Summary

Nessus Network Auditing by Russ Rogers (Penetration Tester for a Federal Agency and Co-founderChief Executive Officer, Peak Security, Inc.)

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues.

About Russ Rogers (Penetration Tester for a Federal Agency and Co-founderChief Executive Officer, Peak Security, Inc.)

Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular Hacking a Terror Network: The Silent Threat of Covert Channels (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling Stealing the Network: How to Own a Continent (Syngress, ISBN: 978-1-931836-05-0) and Network Security Evaluation Using the NSA IEM (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, Sao Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2 (R) (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).

Table of Contents

1. Vulnerability Assessment 2. Introducing Nessus 3. Installing Nessus 4. Running Your First Scan 5. Interpreting Results 6. Vulnerability Types 7. False Positives 8. Under the Hood 9. The Nessus Knowledge Base 10. Enterprise Scanning 11. NASL 12. The Nessus User Community 13. Compliance Monitoring with Nessus 3

Additional information

GOR002626198
9781597492089
1597492086
Nessus Network Auditing by Russ Rogers (Penetration Tester for a Federal Agency and Co-founderChief Executive Officer, Peak Security, Inc.)
Used - Very Good
Paperback
Syngress Media,U.S.
20080627
448
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Nessus Network Auditing