Cargando…

Nmap essentials : harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks /

This book is for beginners who wish to start using Nmap, who have experience as a system administrator or of network engineering, and who wish to get started with Nmap.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shaw, David (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2015.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn911187075
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150618s2015 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d DEBBG  |d YDXCP  |d EBLCP  |d IDEBK  |d E7B  |d DEBSZ  |d COO  |d OCLCQ  |d MERUC  |d TEFOD  |d OCLCQ  |d OCLCF  |d CEF  |d OCLCQ  |d WYU  |d UAB  |d AU@  |d OCLCQ  |d N$T  |d UKMGB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBC1I7391  |2 bnb 
016 7 |a 018007087  |2 Uk 
019 |a 910815655  |a 913844348 
020 |a 9781783988600  |q (electronic bk.) 
020 |a 1783988606  |q (electronic bk.) 
020 |z 1783554061 
020 |z 9781783554065 
029 1 |a AU@  |b 000054976065 
029 1 |a DEBBG  |b BV042683751 
029 1 |a DEBBG  |b BV043620694 
029 1 |a DEBSZ  |b 433956399 
029 1 |a DEBSZ  |b 446589594 
029 1 |a GBVCP  |b 835876675 
029 1 |a UKMGB  |b 018007087 
035 |a (OCoLC)911187075  |z (OCoLC)910815655  |z (OCoLC)913844348 
037 |a CL0500000605  |b Safari Books Online 
037 |a 21DB6C3D-8FF4-45CF-B8EC-10EF2E84689C  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.5485 
082 0 4 |a 004.10298374 
049 |a UAMI 
100 1 |a Shaw, David,  |e author. 
245 1 0 |a Nmap essentials :  |b harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks /  |c David Shaw. 
246 3 0 |a Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed June 10, 2015). 
500 |a Includes index. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Nmap; Nmap's humble beginnings; The many uses of Nmap; Installing Nmap; Building Nmap from source; Summary; Chapter 2: Network Fundamentals; The structure of the Internet; The OSI model; Port scanning; TCP and UDP; Service banners; Summary; Chapter 3: Nmap Basics; How to choose a target; Running a default scan; Service version scans; Logging scans; Specified scan ranges; Understanding the reason flag; Summary; Chapter 4: Advanced Nmap Scans. 
505 8 |a Host detection methodsRunning a ping agnostic scan; Scanning UDP services; Special TCP scans; Operating system detection; Increasing verbosity in scans; Packet tracing; Summary; Chapter 5: Performance Optimization; Nmap timing optimization; Customized host group sizes; Increasing and decreasing parallelism; Dealing with stuck hosts; Delaying and increasing probe rates; Summary; Chapter 6: Introduction to the Nmap Scripting Engine; The history of the NSE; The inner working of the NSE; Finding Nmap scripts; Running Nmap scripts; Summary; Chapter 7: Writing Nmap Scripts. 
505 8 |a Anatomy of an Nmap scriptDefining an Nmap script: script headers; Triggering functions: the rule; Defining a script's action; Summary; Chapter 8: Additional Nmap Tools; Attacking services with Ncrack; Host detection with Nping; File transfers and backdoors with Ncat; Comparing Nmap results with Ndiff; Summary; Chapter 9: Vulnerability Assessments and Tools; Conducting vulnerability scans with Nessus; Assessing web server issues with Nikto; Identifying sensitive web directories with DirBuster; Getting started with intercepting proxies; Summary; Chapter 10: Penetration Testing with Metasploit. 
505 8 |a Installing MetasploitScanning with Metasploit; Attacking services with Metasploit; What to learn next; Summary; Index. 
520 |a This book is for beginners who wish to start using Nmap, who have experience as a system administrator or of network engineering, and who wish to get started with Nmap. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Monitoring  |x Computer programs. 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 6 |a Réseaux d'ordinateurs  |x Surveillance  |x Logiciels. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Logiciels. 
650 7 |a COMPUTERS.  |x Networking  |x Network Protocols.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |x Computer programs  |2 fast 
776 0 8 |i Print version:  |a Shaw, David.  |t Nmap Essentials.  |d Birmingham : Packt Publishing, ©2015  |z 9781783554065 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783554065/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL2058657 
938 |a ebrary  |b EBRY  |n ebr11060796 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31663051 
938 |a YBP Library Services  |b YANK  |n 12455508 
938 |a EBSCOhost  |b EBSC  |n 999644 
994 |a 92  |b IZTAP