Secrets of Network Cartography: A Comprehensive Guide to Nmap by James Messer
Publisher: NetworkUptime.com 2008
ISBN/ASIN: B002ACY22I
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Computers & Internet Networking