Nmap essentials: harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of envir...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2015
|
Schriftenreihe: | Community experience distilled
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781783554065/?ar |
Zusammenfassung: | Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning. By the end of the book, the reader will have gained essential insights into network security analysis. |
Beschreibung: | Includes index. - Online resource; title from cover (Safari, viewed June 10, 2015) |
Umfang: | 1 Online-Ressource (118 Seiten) illustrations |
ISBN: | 9781783988600 1783988606 9781783554065 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047685506 | ||
003 | DE-627-1 | ||
005 | 20240228115900.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781783988600 |c electronic bk. |9 978-1-78398-860-0 | ||
020 | |a 1783988606 |c electronic bk. |9 1-78398-860-6 | ||
020 | |a 9781783554065 |9 978-1-78355-406-5 | ||
035 | |a (DE-627-1)047685506 | ||
035 | |a (DE-599)KEP047685506 | ||
035 | |a (ORHE)9781783554065 | ||
035 | |a (DE-627-1)047685506 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.10298374 | |
100 | 1 | |a Shaw, David |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Nmap essentials |b harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |c David Shaw |
246 | 3 | 3 | |a Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2015 | |
300 | |a 1 Online-Ressource (118 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Includes index. - Online resource; title from cover (Safari, viewed June 10, 2015) | ||
520 | |a Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning. By the end of the book, the reader will have gained essential insights into network security analysis. | ||
650 | 0 | |a Computer networks |x Monitoring |x Computer programs | |
650 | 0 | |a Computer networks |x Security measures |x Computer programs | |
650 | 4 | |a Réseaux d'ordinateurs ; Surveillance ; Logiciels | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels | |
650 | 4 | |a Informatique | |
650 | 4 | |a data processing | |
650 | 4 | |a computer science | |
650 | 4 | |a COMPUTERS ; Networking ; Network Protocols | |
650 | 4 | |a COMPUTERS ; Networking ; General | |
650 | 4 | |a Computer networks ; Security measures ; Computer programs | |
650 | 4 | |a Instructional and educational works | |
650 | 4 | |a Matériel d'éducation et de formation | |
776 | 1 | |z 9781783554065 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781783554065 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781783554065/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047685506 |
---|---|
_version_ | 1829007773367533568 |
adam_text | |
any_adam_object | |
author | Shaw, David |
author_facet | Shaw, David |
author_role | aut |
author_sort | Shaw, David |
author_variant | d s ds |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047685506 (DE-599)KEP047685506 (ORHE)9781783554065 |
dewey-full | 004.10298374 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.10298374 |
dewey-search | 004.10298374 |
dewey-sort | 14.10298374 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03136cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-047685506</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115900.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783988600</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78398-860-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783988606</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78398-860-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783554065</subfield><subfield code="9">978-1-78355-406-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047685506</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047685506</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781783554065</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047685506</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.10298374</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shaw, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nmap essentials</subfield><subfield code="b">harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks</subfield><subfield code="c">David Shaw</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (118 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from cover (Safari, viewed June 10, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning. By the end of the book, the reader will have gained essential insights into network security analysis.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Surveillance ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Network Protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional and educational works</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Matériel d'éducation et de formation</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781783554065</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781783554065</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781783554065/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047685506 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:37Z |
institution | BVB |
isbn | 9781783988600 1783988606 9781783554065 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (118 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Shaw, David VerfasserIn aut Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks David Shaw Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Birmingham, UK Packt Publishing 2015 1 Online-Ressource (118 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Community experience distilled Includes index. - Online resource; title from cover (Safari, viewed June 10, 2015) Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning. By the end of the book, the reader will have gained essential insights into network security analysis. Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Informatique data processing computer science COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Networking ; General Computer networks ; Security measures ; Computer programs Instructional and educational works Matériel d'éducation et de formation 9781783554065 Erscheint auch als Druck-Ausgabe 9781783554065 |
spellingShingle | Shaw, David Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Informatique data processing computer science COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Networking ; General Computer networks ; Security measures ; Computer programs Instructional and educational works Matériel d'éducation et de formation |
title | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
title_alt | Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
title_auth | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
title_exact_search | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
title_full | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks David Shaw |
title_fullStr | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks David Shaw |
title_full_unstemmed | Nmap essentials harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks David Shaw |
title_short | Nmap essentials |
title_sort | nmap essentials harness the power of nmap the most versatile network port scanner on the planet to secure large scale networks |
title_sub | harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks |
topic | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Informatique data processing computer science COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Networking ; General Computer networks ; Security measures ; Computer programs Instructional and educational works Matériel d'éducation et de formation |
topic_facet | Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Réseaux d'ordinateurs ; Surveillance ; Logiciels Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels Informatique data processing computer science COMPUTERS ; Networking ; Network Protocols COMPUTERS ; Networking ; General Computer networks ; Security measures ; Computer programs Instructional and educational works Matériel d'éducation et de formation |
work_keys_str_mv | AT shawdavid nmapessentialsharnessthepowerofnmapthemostversatilenetworkportscannerontheplanettosecurelargescalenetworks AT shawdavid harnessthepowerofnmapthemostversatilenetworkportscannerontheplanettosecurelargescalenetworks |