
上QQ阅读APP看书,第一时间看更新
Introduction
In this chapter, we will be going through various recipes about how to manage Nessus as a tool and its various components. These recipes will help us gain detailed knowledge of the post-installation steps to be performed in order to be able to configure Nessus to perform network scans of a varied nature.