skip to content
Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7. Preview this item
ClosePreview this item
Checking...

Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.

Author: Sairam Jetty
Publisher: Birmingham : Packt Publishing Ltd, 2018.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Jetty, Sairam.
Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.
Birmingham : Packt Publishing Ltd, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sairam Jetty
ISBN: 9781789342642 1789342643
OCLC Number: 1056865756
Notes: Chapter 6: Report Analysis and Confirmation.
Description: 1 online resource (298 pages)
Contents: Cover; Title Page; Copyright and Credits; Packt Upsell; Foreword; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery. Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ... Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction. How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans. Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ...

Abstract:

Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1056865756> # Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "1056865756" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/5391917092#Place/birmingham> ; # Birmingham
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'https://img1.od-cdn.com/ImageType-100/6135-1/{BDD9CE7D-AFE0-4A23-87F8-A4B2EB75B4AC}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5391917092#Topic/user_interfaces> ; # User interfaces
    schema:about <http://dewey.info/class/005.437/> ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/5391917092#Person/jetty_sairam> ; # Sairam Jetty
    schema:datePublished "2018" ;
    schema:description "Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly."@en ;
    schema:description "Cover; Title Page; Copyright and Credits; Packt Upsell; Foreword; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5391917092> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/5391917092#CreativeWork/network_scanning_cookbook_practical_network_security_using_nmap_and_nessus_7> ;
    schema:name "Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7."@en ;
    schema:productID "1056865756" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1056865756#PublicationEvent/birmingham_packt_publishing_ltd_2018> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/5391917092#Agent/packt_publishing_ltd> ; # Packt Publishing Ltd
    schema:url <https://samples.overdrive.com/?crid=bdd9ce7d-afe0-4a23-87f8-a4b2eb75b4ac&.epub-sample.overdrive.com> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5532273> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5532273> ;
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781789342642> ;
    schema:url "https://img1.od-cdn.com/ImageType-100/6135-1/{BDD9CE7D-AFE0-4A23-87F8-A4B2EB75B4AC}Img100.jpg" ;
    schema:url <https://www.overdrive.com/search?q=BDD9CE7D-AFE0-4A23-87F8-A4B2EB75B4AC> ;
    schema:workExample <http://worldcat.org/isbn/9781789342642> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1056865756> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5391917092#Agent/packt_publishing_ltd> # Packt Publishing Ltd
    a bgn:Agent ;
    schema:name "Packt Publishing Ltd" ;
    .

<http://experiment.worldcat.org/entity/work/data/5391917092#Person/jetty_sairam> # Sairam Jetty
    a schema:Person ;
    schema:familyName "Jetty" ;
    schema:givenName "Sairam" ;
    schema:name "Sairam Jetty" ;
    .

<http://worldcat.org/entity/work/data/5391917092#CreativeWork/network_scanning_cookbook_practical_network_security_using_nmap_and_nessus_7>
    a schema:CreativeWork ;
    rdfs:label "Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1056865756> ; # Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.
    .

<http://worldcat.org/isbn/9781789342642>
    a schema:ProductModel ;
    schema:isbn "1789342643" ;
    schema:isbn "9781789342642" ;
    .

<http://www.worldcat.org/title/-/oclc/1056865756>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1056865756> ; # Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.
    schema:dateModified "2019-05-11" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.