Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Gordon Fyodor Lyon)

0.0 (0)
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning (Gordon Fyodor Lyon)

The official manual for the Nmap Security Scanner, a free and open-source tool used by millions of people for network discovery, administration, and security audits, is called Nmap Network Scanning.

This book is appropriate for all levels of security and networking experts, covering everything from the fundamentals of port scanning for beginners to low-level packet-building techniques used by skilled hackers. Every Nmap function and option is described in a 42-page reference manual, and the remainder of the book shows how to use those capabilities to do tasks rapidly in the real world. Examples and illustrations demonstrate actual wire-to-wire communication.

The course covers topics like bypassing firewalls and intrusion detection systems, improving Nmap's performance, and using the Nmap Scripting Engine to automate routine networking operations. For popular applications including network inventory, penetration testing, spotting rogue wireless access points, and stopping network worm outbreaks, tips and instructions are offered. Windows, Linux, and Mac OS X all support Nmap.

Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development.

Ebook Details

About the Authors
Gordon Lyon (also known by his nickname Fyodor) released Nmap in 1997 and continues to coordinate its development. He also maintains the Insecure.Org, Nmap.Org, SecLists.Org, and SecTools.Org security resource sites and has written seminal papers on OS detection and stealth port scanning. He is a founding member of the Honeynet Project, a popular speaker at security conferences, and co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent". 
Published Date / Year
(January 1, 2009)
468 pages
eBook Format

Similar Programming & Computer Books

Optical Communication (Narottam Das)
In data processing, networking, and telecommunications systems, optical communication is incredibly helpful. It is made up of a transmitter that converts a message into an optical signal, a channel...
Advances in Optical Communication (Narottam Das)
The research, development, and design engineers from the teams in the manufacturing industry, academia, and communications industries are the target audience for this book. ...
Java 2 Network Security (Marco Pistoia, et al.)
With thorough coverage of the new Java 2 security models, this book offers the entire insiders' guide to protecting Java 2 enterprise applications. Developed to assist you in incorporating...
Cellular: An Economic and Business History of the International Mobile-Phone Industry (Daniel D. Garcia-Swartz, et al)
From the late 1970s to the present, charts the development of the global cellular industry. It took exceptional collaboration between businesses, governments, and industrial sectors for the mobile phone...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Image Steganography and Steganalysis (Philip Bateman)
The art of steganography is two-way secret communication that hides both the existence and the content of a message.
Textbook of Forensic Medicine and Toxicology (Nageshkumar G. Rao)
For forensic science undergraduate students, this book is thorough. Students pursuing careers in the ayurveda, homoeopathic, unani, and siddha systems of medicine might also find it helpful. ...
Concise Textbook Forensic Medicine Toxicology (R. K. Sharma, et al)
This free programming book has been prepared succinctly to aid the students in understanding the subject and is intended to give the reader with fundamental and applicable knowledge of...

Others Programming Books by Gordon Fyodor Lyon

Security Engineering: A Guide to Building Dependable Distributed Systems (Gordon Fyodor Lyon)
Massively thorough and meticulously studied, Security Engineering demonstrates how challenging it is to safeguard information systems from tampering, eavesdropping, illegal usage, and general malice.

User reviews

There are no user reviews for this listing.
Rate this Book