Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
2008
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492416/?ar |
Zusammenfassung: | Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. Tool around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xiii, 245 pages) illustrations |
ISBN: | 9781597492416 1597492418 9780080558745 0080558747 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647477 | ||
003 | DE-627-1 | ||
005 | 20240228114228.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9781597492416 |9 978-1-59749-241-6 | ||
020 | |a 1597492418 |9 1-59749-241-8 | ||
020 | |a 9780080558745 |c electronic bk. |9 978-0-08-055874-5 | ||
020 | |a 0080558747 |c electronic bk. |9 0-08-055874-7 | ||
035 | |a (DE-627-1)047647477 | ||
035 | |a (DE-599)KEP047647477 | ||
035 | |a (ORHE)9781597492416 | ||
035 | |a (DE-627-1)047647477 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Orebaugh, Angela |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Nmap in the enterprise |b your guide to network scanning |c Angela Orebaugh, Becky Pinkard |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c 2008 | |
300 | |a 1 Online-Ressource (xiii, 245 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. Tool around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums. | ||
650 | 0 | |a Computer networks |x Monitoring |x Computer programs | |
650 | 0 | |a Computer networks |x Security measures |x Computer programs | |
650 | 4 | |a Réseaux d'ordinateurs ; Surveillance ; Logiciels | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures ; Computer programs | |
700 | 1 | |a Pinkard, Becky |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597492418 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597492418 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492416/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647477 |
---|---|
_version_ | 1835903182334590976 |
adam_text | |
any_adam_object | |
author | Orebaugh, Angela |
author2 | Pinkard, Becky |
author2_role | ctb |
author2_variant | b p bp |
author_facet | Orebaugh, Angela Pinkard, Becky |
author_role | aut |
author_sort | Orebaugh, Angela |
author_variant | a o ao |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647477 (DE-599)KEP047647477 (ORHE)9781597492416 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04069cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-047647477</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114228.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492416</subfield><subfield code="9">978-1-59749-241-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492418</subfield><subfield code="9">1-59749-241-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558745</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055874-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558747</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055874-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492416</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647477</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Orebaugh, Angela</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nmap in the enterprise</subfield><subfield code="b">your guide to network scanning</subfield><subfield code="c">Angela Orebaugh, Becky Pinkard</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 245 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. Tool around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Surveillance ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Computer programs</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pinkard, Becky</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597492418</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597492418</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492416/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647477 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:12Z |
institution | BVB |
isbn | 9781597492416 1597492418 9780080558745 0080558747 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xiii, 245 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Orebaugh, Angela VerfasserIn aut Nmap in the enterprise your guide to network scanning Angela Orebaugh, Becky Pinkard Burlington, MA Syngress Pub. 2008 1 Online-Ressource (xiii, 245 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. Understand Network Scanning Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. Get Inside Nmap Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. Install, Configure, and Optimize Nmap Deploy Nmap on Windows, Linux, Mac OS X, and install from source. Take Control of Nmap with the Zenmap GUI Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. Run Nmap in the Enterprise Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions Raise those Fingerprints Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. Tool around with Nmap Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. Analyze Real-World Nmap Scans Follow along with the authors to analyze real-world Nmap scans. Master Advanced Nmap Scanning Techniques Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums. Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs Pinkard, Becky MitwirkendeR ctb 1597492418 Erscheint auch als Druck-Ausgabe 1597492418 |
spellingShingle | Orebaugh, Angela Nmap in the enterprise your guide to network scanning Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs |
title | Nmap in the enterprise your guide to network scanning |
title_auth | Nmap in the enterprise your guide to network scanning |
title_exact_search | Nmap in the enterprise your guide to network scanning |
title_full | Nmap in the enterprise your guide to network scanning Angela Orebaugh, Becky Pinkard |
title_fullStr | Nmap in the enterprise your guide to network scanning Angela Orebaugh, Becky Pinkard |
title_full_unstemmed | Nmap in the enterprise your guide to network scanning Angela Orebaugh, Becky Pinkard |
title_short | Nmap in the enterprise |
title_sort | nmap in the enterprise your guide to network scanning |
title_sub | your guide to network scanning |
topic | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs |
topic_facet | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs |
work_keys_str_mv | AT orebaughangela nmapintheenterpriseyourguidetonetworkscanning AT pinkardbecky nmapintheenterpriseyourguidetonetworkscanning |