Nessus network auditing:
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. Oxford
Syngress Elsevier Science [distributor]
2007
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison |
Beschreibung: | Previous edition: 2004 |
Beschreibung: | 1 online resource (1 volume) |
ISBN: | 9781597492089 1597492086 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124739 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597492089 |9 978-1-59749-208-9 | ||
020 | |a 1597492086 |9 1-59749-208-6 | ||
035 | |a (ZDB-33-ESD)ocn228301211 | ||
035 | |a (OCoLC)228301211 | ||
035 | |a (DE-599)BVBBV046124739 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.6 |2 22 | |
100 | 1 | |a Beale, Jay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Nessus network auditing |c Jay Beale, Russ Rogers |
250 | |a 2nd ed | ||
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress |b Elsevier Science [distributor] |c 2007 | |
300 | |a 1 online resource (1 volume) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Previous edition: 2004 | ||
520 | |a The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison | ||
650 | 7 | |a Computer networks |2 fast | |
650 | 4 | |a Computer networks | |
650 | 0 | 7 | |a Nessus |g Programm |0 (DE-588)4820492-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Nessus |g Programm |0 (DE-588)4820492-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Rogers, Russ |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492089 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505193 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597492089 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443064434688 |
---|---|
any_adam_object | |
author | Beale, Jay |
author_facet | Beale, Jay |
author_role | aut |
author_sort | Beale, Jay |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV046124739 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn228301211 (OCoLC)228301211 (DE-599)BVBBV046124739 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03416nmm a2200433zc 4500</leader><controlfield tag="001">BV046124739</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492089</subfield><subfield code="9">978-1-59749-208-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492086</subfield><subfield code="9">1-59749-208-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn228301211</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228301211</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124739</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beale, Jay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nessus network auditing</subfield><subfield code="c">Jay Beale, Russ Rogers</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition: 2004</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Nessus</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4820492-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Nessus</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4820492-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492089</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505193</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597492089</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124739 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781597492089 1597492086 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505193 |
oclc_num | 228301211 |
open_access_boolean | |
physical | 1 online resource (1 volume) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Elsevier Science [distributor] |
record_format | marc |
spelling | Beale, Jay Verfasser aut Nessus network auditing Jay Beale, Russ Rogers 2nd ed Rockland, Mass. Oxford Syngress Elsevier Science [distributor] 2007 1 online resource (1 volume) txt rdacontent c rdamedia cr rdacarrier Previous edition: 2004 The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. * Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. * Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. * Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. * Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. * Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. * Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). * Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. * Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. * The first edition is still the only book available on the product. * Written by the world's premier Nessus developers and featuring a forword by the creator of Nessus, Renaud Deraison Computer networks fast Computer networks Nessus Programm (DE-588)4820492-4 gnd rswk-swf Nessus Programm (DE-588)4820492-4 s 1\p DE-604 Rogers, Russ Sonstige oth http://www.sciencedirect.com/science/book/9781597492089 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Beale, Jay Nessus network auditing Computer networks fast Computer networks Nessus Programm (DE-588)4820492-4 gnd |
subject_GND | (DE-588)4820492-4 |
title | Nessus network auditing |
title_auth | Nessus network auditing |
title_exact_search | Nessus network auditing |
title_full | Nessus network auditing Jay Beale, Russ Rogers |
title_fullStr | Nessus network auditing Jay Beale, Russ Rogers |
title_full_unstemmed | Nessus network auditing Jay Beale, Russ Rogers |
title_short | Nessus network auditing |
title_sort | nessus network auditing |
topic | Computer networks fast Computer networks Nessus Programm (DE-588)4820492-4 gnd |
topic_facet | Computer networks Nessus Programm |
url | http://www.sciencedirect.com/science/book/9781597492089 |
work_keys_str_mv | AT bealejay nessusnetworkauditing AT rogersruss nessusnetworkauditing |