Nessus Network Auditing 1st Edition by Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder ,George Theall, Andy Johnston, Jimmy Alderson – Ebook PDF Instant Download/Delivery: 9781931836081, 1931836086
Full download Nessus Network Auditing 1st Edition after payment

Product details:
ISBN 10: 1931836086
ISBN 13: 9781931836081
Author: Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder ,George Theall, Andy Johnston, Jimmy Alderson
This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.
* Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the “most popular” open source security tool of any kind.
* This is the first book available on Nessus and it is written by the world’s premier Nessus developers led by the creator of Nessus, Renaud Deraison.
* The dramatic success of Syngress’ SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented.
Table of contents:
1 Introduction
1.1 History
1.2 Differences between NASL1 and NASL2
1.3 Copyright
1.4 Comments
2 The NASL2 Grammar
2.1 Preliminary Remarks
2.2 Syntax
2.3 Types
2.4 Operators
2.5 Precedence
2.6 Loops and Control Flow
2.7 Declarations
3 The NASL2 Library
3.1 Predefined Constants
3.2 Built-in Functions
3.3 NASL Library
4 Hacking your Way Inside the Interpretor
4.1 How It Works
4.2 Adding New Internal Functions
4.3 Adding New Features to the Grammar
References
Endnotes
Appendix B Utilizing Domain Credentials to Enhance Nessus Scans
Overview
Account Creation and Configuration
Manual Modifications
Nessus Scan Configuration
Comparing Scan Results
Comparing Scan 1 with Scan 2
Comparing Scan 2 with Scan 3
Conclusion
Index
People also search for:
nessus network
tenable nessus network monitor
install nessus network monitor
tenable nessus network monitor download
tenable nessus network requirements
Tags:
Renaud Deraison,Noam Rathaus,HD Moore,Raven Alder,George Theall,Andy Johnston,Jimmy Alderson,Nessus Network,Auditing 1st