Nmap 6: network exploration and security auditing Cookbook
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Pub.
2012
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | "Quick answers to common problems"--Cover. - "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover Online resource; title from cover (Safari, viewed Jan. 22, 2013) |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9781849517492 1849517495 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349912 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849517492 |9 978-1-84951-749-2 | ||
020 | |a 1849517495 |9 1-84951-749-5 | ||
035 | |a (ZDB-4-ITC)ocn825076489 | ||
035 | |a (OCoLC)825076489 | ||
035 | |a (DE-599)BVBBV045349912 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Pale, Paulino Calderon |e Verfasser |4 aut | |
245 | 1 | 0 | |a Nmap 6 |b network exploration and security auditing Cookbook |c Paulino Calderon Pale |
264 | 1 | |a Birmingham |b Packt Pub. |c 2012 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a "Quick answers to common problems"--Cover. - "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover | ||
500 | |a Online resource; title from cover (Safari, viewed Jan. 22, 2013) | ||
505 | 8 | |a In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures / Computer programs |2 fast | |
650 | 4 | |a Computer networks |x Monitoring |x Computer programs |a Computer networks |x Security measures |x Computer programs | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Pale, Paulino Calderon |t Nmap 6 : Network exploration and security auditing Cookbook |d Birmingham : Packt Publishing, 2012 |z 9781849517485 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736566 |
Datensatz im Suchindex
_version_ | 1804179174159548416 |
---|---|
any_adam_object | |
author | Pale, Paulino Calderon |
author_facet | Pale, Paulino Calderon |
author_role | aut |
author_sort | Pale, Paulino Calderon |
author_variant | p c p pc pcp |
building | Verbundindex |
bvnumber | BV045349912 |
collection | ZDB-4-ITC |
contents | In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine |
ctrlnum | (ZDB-4-ITC)ocn825076489 (OCoLC)825076489 (DE-599)BVBBV045349912 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03350nmm a2200409zc 4500</leader><controlfield tag="001">BV045349912</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849517492</subfield><subfield code="9">978-1-84951-749-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849517495</subfield><subfield code="9">1-84951-749-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn825076489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)825076489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349912</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pale, Paulino Calderon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nmap 6</subfield><subfield code="b">network exploration and security auditing Cookbook</subfield><subfield code="c">Paulino Calderon Pale</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Quick answers to common problems"--Cover. - "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed Jan. 22, 2013)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="x">Computer programs</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Pale, Paulino Calderon</subfield><subfield code="t">Nmap 6 : Network exploration and security auditing Cookbook</subfield><subfield code="d">Birmingham : Packt Publishing, 2012</subfield><subfield code="z">9781849517485</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736566</subfield></datafield></record></collection> |
id | DE-604.BV045349912 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849517492 1849517495 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736566 |
oclc_num | 825076489 |
open_access_boolean | |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub. |
record_format | marc |
series2 | Community experience distilled |
spelling | Pale, Paulino Calderon Verfasser aut Nmap 6 network exploration and security auditing Cookbook Paulino Calderon Pale Birmingham Packt Pub. 2012 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Community experience distilled "Quick answers to common problems"--Cover. - "A complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators"--Cover Online resource; title from cover (Safari, viewed Jan. 22, 2013) In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer networks Monitoring Computer programs Computer networks Security measures Computer programs Erscheint auch als Druck-Ausgabe Pale, Paulino Calderon Nmap 6 : Network exploration and security auditing Cookbook Birmingham : Packt Publishing, 2012 9781849517485 |
spellingShingle | Pale, Paulino Calderon Nmap 6 network exploration and security auditing Cookbook In Detail Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the power of NSE, you will also learn how to write your own NSE scripts. "Nmap 6: Network exploration and security auditing cookbook" is a book full of practical knowledge for every security consultant, administrator or enthusiast looking to master Nmap. The book overviews the most important port scanning and host discovery techniques supported by Nmap. You will learn how to detect mis-configurations in web, mail and database servers and also how to implement your own monitoring system. The book also covers tasks for reporting, scanning numerous hosts, vulnerability detection and exploitation, and its strongest aspect; information gathering. Approach The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. Who this book is for This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer networks Monitoring Computer programs Computer networks Security measures Computer programs |
title | Nmap 6 network exploration and security auditing Cookbook |
title_auth | Nmap 6 network exploration and security auditing Cookbook |
title_exact_search | Nmap 6 network exploration and security auditing Cookbook |
title_full | Nmap 6 network exploration and security auditing Cookbook Paulino Calderon Pale |
title_fullStr | Nmap 6 network exploration and security auditing Cookbook Paulino Calderon Pale |
title_full_unstemmed | Nmap 6 network exploration and security auditing Cookbook Paulino Calderon Pale |
title_short | Nmap 6 |
title_sort | nmap 6 network exploration and security auditing cookbook |
title_sub | network exploration and security auditing Cookbook |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer networks Monitoring Computer programs Computer networks Security measures Computer programs |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures / Computer programs Computer networks Monitoring Computer programs Computer networks Security measures Computer programs |
work_keys_str_mv | AT palepaulinocalderon nmap6networkexplorationandsecurityauditingcookbook |