Nessus network auditing

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de...

Full description

Main Author: Beale, Jay.
Other Authors: Rogers, Russ., ScienceDirect (Online service)
Format: eBook
Language: English
Published: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2007.
Physical Description: 1 online resource (1 volume)
Edition: 2nd ed.
Subjects:
LEADER 04268cam a2200589Ia 4500
001 228301211
003 OCoLC
005 20180526100141.7
006 m o d
007 cr cn|||||||||
008 080519s2007 mau o 000 0 eng d
020 |a 9781597492089 
020 |a 1597492086 
035 |a (OCoLC)228301211 
037 |a 141534:141678  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d OCLCF  |d YDXCP  |d OCLCQ 
049 |a COM6 
050 4 |a TK5105.5  |b .B43 2008eb 
082 0 4 |a 004.6  |2 22 
100 1 |a Beale, Jay. 
245 1 0 |a Nessus network auditing /  |c Jay Beale, Russ Rogers. 
250 |a 2nd ed. 
264 1 |a Rockland, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2007. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
520 |a The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison. 
500 |a Previous edition: 2004. 
588 0 |a Print version record. 
590 |a Elsevier  |b ScienceDirect All Books. 
650 0 |a Computer networks. 
650 7 |a Computer networks.  |2 fast. 
655 4 |a Electronic books. 
700 1 |a Rogers, Russ. 
710 2 |a ScienceDirect (Online service) 
776 0 8 |i Print version:  |a Beale, Jay.  |t Nessus network auditing.  |b 2nd ed.  |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2007  |z 9781597492089  |z 1597492086  |w (OCoLC)173499483. 
907 |a .b49808990  |b multi  |c -  |d 160302  |e 230104 
998 |a cue  |a cu  |b 180626  |c m  |d z   |e -  |f eng  |g mau  |h 0  |i 2 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.netlib2 in 2016 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 180626  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Elsevier  |1 .i119613803  |u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9781597492089  |3 Elsevier  |z Click here for access