logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Nmap in the Enterprise: Your Guide to Network Scanning

Nmap in the Enterprise: Your Guide to Network Scanning (Paperback)

(Your Guide to Network Scanning)

Angela Orebaugh, Becky Pinkard (지은이)
Syngress Media Inc
72,000원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
64,800원 -10% 0원
3,240원
61,560원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Nmap in the Enterprise: Your Guide to Network Scanning
eBook 미리보기

책 정보

· 제목 : Nmap in the Enterprise: Your Guide to Network Scanning (Paperback) (Your Guide to Network Scanning)
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 일반
· ISBN : 9781597492416
· 쪽수 : 264쪽
· 출판일 : 2008-01-01

목차

Chapter 1: Introducing Network Scanning. This chapter will cover the fundamentals of network scanning and how it works and why it is used. It will also include the necessary TCP/IP and networking background for a beginning user.
Chapter 2: Introducing Nmap. This chapter will provide an overview of the nmap tool including the main features, basic functionality, history, and other resources. This chapter will also cover the uses of nmap such as security auditing, policy compliance testing, network inventory, and asset management.
Chapter 3: Using Nmap. This chapter will cover downloading and installing nmap and cover its basic usage including command line options for scanning techniques, ping options, OS fingerprinting, logging, and other options. It should also include a section on Windows only options.
Chapter 4: Fingerprinting with Nmap. This chapter will cover the fundamentals of operating system fingerprinting and version detection. It will provide details on how nmap performs fingerprinting. This chapter will also include related tools such as IP Personality and Morph that are used to defeat nmap fingerprinting.
Chapter 5: Detection and Evasion with Nmap. This chapter will provide an overview of the methods used to detect nmap scans, such as Snort signatures. It will also cover Nmap evasion techniques that are used to evade detection.
Chapter 6: Scanning in the Real World. This chapter will provide several examples of nmap scanning and the results of the scan. It will be written so the user can follow along as if he/she is performing the scan, thus mimicking a real life scenario or lab work. A good example to include would be using nmap to audit a firewall.
Chapter 7: Tooling Around with Nmap. This chapter will cover a variety of tools that either use nmap or work with nmap to perform various network and security-related functionality. Tools may include Remote nmap (Rnmap), Bilbo, NDiff, nlog, Sawmill, and Nmap-Parser.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책