Nessus Network Auditing: Jay Beale Open Source Security Series

Nessus Network Auditing: Jay Beale Open Source Security Series

Pub. Date:
Elsevier Science
Select a Purchase Option (CD-ROM Included)
  • purchase options
    $28.86 $51.95 Save 44% Current price is $28.86, Original price is $51.95. You Save 44%.
    Note: Access code and/or supplemental material are not guaranteed to be included with textbook rental or used textbook.
  • purchase options


Nessus Network Auditing: Jay Beale Open Source Security Series

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.

• Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind.

• This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison.

• The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented.

Product Details

ISBN-13: 9781931836081
Publisher: Elsevier Science
Publication date: 08/03/2004
Series: Jay Beale's Open Source Security
Edition description: CD-ROM Included
Pages: 550
Product dimensions: 6.92(w) x 9.18(h) x 1.32(d)

Table of Contents

Chapter 1: Vulnerability Assessment
Chapter 2: Introducing Nessus
Chapter 3: Installing Nessus
Chapter 4: Running Your First Scan
Chapter 5: Interpreting Results
Chapter 6: Vulnerability Types
Chapter 7: False Positives
Chapter 8: Under the Hood
Chapter 9: The Nessus Knowledge Base
Chapter 10: Enterprise Scanning
Chapter 11: NASL
Chapter 12: The Nessus User Community
Appendix A: The NASL2 Reference Manual
Appendix B: Utilizing Domain Credentials to Enhance Nessus Scans

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews