Free Downloads
Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security)

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind.* This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison.* The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented.

Series: Jay Beale's Open Source Security

Paperback: 550 pages

Publisher: Syngress; 1 edition (August 3, 2004)

Language: English

ISBN-10: 1931836086

ISBN-13: 978-1931836081

Product Dimensions: 7 x 1.4 x 9.3 inches

Shipping Weight: 2 pounds

Average Customer Review: 4.2 out of 5 stars  See all reviews (13 customer reviews)

Best Sellers Rank: #580,448 in Books (See Top 100 in Books) #5 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > WAN #129 in Books > Computers & Technology > Networking & Cloud Computing > Intranets & Extranets #138 in Books > Computers & Technology > Certification > CompTIA

'Nessus Network Auditing' (NNA) is the definitive (and only) guide to the Nessus open source vulnerability assessment tool. I recommend all security professionals read this book. You may start as a Nessus user, but the book will help you become part of the Nessus community.NNA features twelve contributors, but it doesn't suffer the fate of other books with similar high author counts. NNA manages to present fairly original material in each chapter, without a lot of overlap. I credit the lead authors and editors for keeping the contributors on track. They could have reduced the number of crashing printer stories, however.Several chapters stood out from the others. Ch 1 explains the need for conducting vulnerability assessment. Ch 3 makes a good case for always installing from source code and not trusting precompiled binaries. Chs 8 and 9 deliver real value with insights into Nessus internals, such as scanning architecture and the Nessus Knowledge Base. Ch 10 presents crude albeit workable ways to measure bandwidth to alleviate loads caused by scans. Ch 11 is an excellent rationale for the Nessus Attack Scripting Language (NASL) written by Nessus' creator. I would have liked to have seen an appendix based on an actual (perhaps sanitized) scan, showing how a security admin selected tests, ran the scan, and validated results.NNA suffers a few problems. A few typos are present, but nothing that distracts from the book's content. I did find the ch 4 author's mention of the TCP "triple handshake" to be odd. While not wrong, this process is usually called the "three-way handshake." The screenshots in appendix B are of poor quality and should be replaced in future editions.Note that the Nessus version used in NNA varies from 2.0.9 to 2.0.

Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security) Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Pro OpenSolaris: A New Open Source OS for Linux Developers and Administrators (Expert's Voice in Open Source) Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services Introductory Accounting, Finance and Auditing for Lawyers (American Casebook Series) Network Security Assessment: Know Your Network The Next Step: Advanced Medical Coding and Auditing, 2015 Edition, 1e Guidelines for Auditing Process Safety Management Systems Network Security: Private Communications in a Public World (Radia Perlman Series in Computer Networking and Security) Surgery Open Heart: A Surgical Nurse Guides You Through Open Heart Surgery (Open Heart Surgery, Aortic Valve / Mitral Valve Replacement, Coronary Artery Bypass, Aortic Aneurysm, Myxoma) CompTIA Security+ Guide to Network Security Fundamentals Monitor Your Home Network: A How-To Guide to Monitoring a Small, Private Network How To Set Up a Home Network With Windows 7: Your Step-By-Step Guide To Setting Up a Home Network With Windows 7 Home Network Handbook: Learn how to set up your home network Network Programmability and Automation: Skills for the Next-Generation Network Engineer Effective TCP/IP Programming: 44 Tips to Improve Your Network Programs: 44 Tips to Improve Your Network Programs Wireless Network Administration A Beginner's Guide (Network Pro Library) Descubra los secretos del network marketing: Redes de Mercadeo y Network marketing (Spanish Edition) Embedded Linux Primer: A Practical Real-World Approach (Prentice Hall Open Source Software Development Series) Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)