Muutke küpsiste eelistusi

Nmap in the Enterprise: Your Guide to Network Scanning [Pehme köide]

, (Washington, D.C. Senior Scientist in the Advanced Technology Research Center, Sytex, Inc., Washington, DC, USA)
  • Formaat: Paperback / softback, 264 pages, kõrgus x laius: 235x191 mm, kaal: 550 g
  • Ilmumisaeg: 10-Apr-2008
  • Kirjastus: Syngress Media,U.S.
  • ISBN-10: 1597492418
  • ISBN-13: 9781597492416
Teised raamatud teemal:
  • Formaat: Paperback / softback, 264 pages, kõrgus x laius: 235x191 mm, kaal: 550 g
  • Ilmumisaeg: 10-Apr-2008
  • Kirjastus: Syngress Media,U.S.
  • ISBN-10: 1597492418
  • ISBN-13: 9781597492416
Teised raamatud teemal:
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.

Arvustused

"Nmap is one of the tools in your toolbox. I would recommend everyone in the world use it." --Richard Stiennon, vice president at Gartner

Muu info

A comprehensive guide and tool suite for Nmap, which has over 1,000,000 users.
1. Introducing Network Scanning
2. Introducing Nmap
3. Using Nmap
4. Fingerprinting with Nmap
5. Detection and Evasion with Nmap
6. Scanning in the Real World
7. Tooling Around with Nmap
Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University.