
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Nmap in the Enterprise: Your Guide to Network Scanning
- Author(s): Angela Orebaugh, Becky Pinkard
- Publisher: Syngress; eBook (Online Editions)
- Hardcover/Paperback: 264 pages
- eBook: PDF
- Language: English
- ISBN-10: 1597492418
- ISBN-13: 978-1597492416
- ASIN: B00T3P4TA0 :
![]() |
Nmap (Network Mapper) is the most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
About the Authors- N/A
- Networks Administration and Management
- Digital and Computer Forensics, Forensic Science, Steganography, Watermarking, Nmap, etc.
- Computer Networks and Communications
- Computer and Information Security

- Nmap in the Enterprise: Your Guide to Network Scanning (Angela Orebaugh, et al.)
- The Mirror Site (1) - PDF
-
Nmap Cookbook: The Fat-Free Guide to Network Security Scanning
This book provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.
-
Nmap Network Scanning: The Official Nmap Guide
This book is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. A reference guide documents every Nmap feature and option.
-
Secrets of Network Cartography: A Comprehensive Guide to Nmap
In this book, thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis!
-
Mobile Forensics – The File Format Handbook
It summarizes knowledge about several file systems and file formats commonly used in mobile devices. The aim is to act as a knowledge base and reference guide for digital forensic practitioners who need knowledge about a specific file system or file format.
-
Forensic Discovery (Dan Farmer, et al)
This book covers both theory and hands-on practice of computer forensics, introducing a powerful approach that can often recover evidence considered lost forever. It covers everything from file systems, to memory and kernel hacks, to malware.
:
|
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |