Nmap :: network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators /
Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2017.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z... |
Beschreibung: | Previous edition published: 2012. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781786461537 1786461536 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn990194769 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 170616s2017 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d UMI |d IDEBK |d N$T |d TOH |d OCLCQ |d OCLCF |d CEF |d KSU |d UAB |d QGK |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ | ||
020 | |a 9781786461537 |q (electronic bk.) | ||
020 | |a 1786461536 |q (electronic bk.) | ||
020 | |z 9781786467454 | ||
035 | |a (OCoLC)990194769 | ||
037 | |a CL0500000867 |b Safari Books Online | ||
050 | 4 | |a TK5105.5485 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.24 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Calderon, Paulino, |e author. | |
245 | 1 | 0 | |a Nmap : |b network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / |c Paulino Calderon. |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2017. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | |a Description based on online resource; title from title page (Safari, viewed June 16, 2017). | ||
500 | |a Previous edition published: 2012. | ||
504 | |a Includes bibliographical references. | ||
520 | |a Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z... | ||
650 | 0 | |a Computer networks |x Monitoring |x Computer programs. | |
650 | 0 | |a Computer networks |x Security measures |x Computer programs. | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 6 | |a Réseaux d'ordinateurs |x Surveillance |x Logiciels. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |x Logiciels. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |x Computer programs |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820 |3 Volltext | |
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis38290889 | ||
938 | |a EBSCOhost |b EBSC |n 1527820 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn990194769 |
---|---|
_version_ | 1813903762020892672 |
adam_text | |
any_adam_object | |
author | Calderon, Paulino |
author_facet | Calderon, Paulino |
author_role | aut |
author_sort | Calderon, Paulino |
author_variant | p c pc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5485 |
callnumber-search | TK5105.5485 |
callnumber-sort | TK 45105.5485 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)990194769 |
dewey-full | 004.24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.24 |
dewey-search | 004.24 |
dewey-sort | 14.24 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05333cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn990194769</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">170616s2017 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">UMI</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">TOH</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">CEF</subfield><subfield code="d">KSU</subfield><subfield code="d">UAB</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781786461537</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1786461536</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781786467454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)990194769</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000867</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5485</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.24</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calderon, Paulino,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nmap :</subfield><subfield code="b">network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators /</subfield><subfield code="c">Paulino Calderon.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed June 16, 2017).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2012.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Monitoring</subfield><subfield code="x">Computer programs.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Surveillance</subfield><subfield code="x">Logiciels.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Logiciels.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis38290889</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1527820</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn990194769 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:23:50Z |
institution | BVB |
isbn | 9781786461537 1786461536 |
language | English |
oclc_num | 990194769 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Calderon, Paulino, author. Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / Paulino Calderon. Second edition. Birmingham, UK : Packt Publishing, 2017. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on online resource; title from title page (Safari, viewed June 16, 2017). Previous edition published: 2012. Includes bibliographical references. Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z... Computer networks Monitoring Computer programs. Computer networks Security measures Computer programs. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Réseaux d'ordinateurs Surveillance Logiciels. Réseaux d'ordinateurs Sécurité Mesures Logiciels. Tests d'intrusion. COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Security measures Computer programs fast Penetration testing (Computer security) fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820 Volltext |
spellingShingle | Calderon, Paulino Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / Computer networks Monitoring Computer programs. Computer networks Security measures Computer programs. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Réseaux d'ordinateurs Surveillance Logiciels. Réseaux d'ordinateurs Sécurité Mesures Logiciels. Tests d'intrusion. COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Security measures Computer programs fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011003137 |
title | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / |
title_auth | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / |
title_exact_search | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / |
title_full | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / Paulino Calderon. |
title_fullStr | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / Paulino Calderon. |
title_full_unstemmed | Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / Paulino Calderon. |
title_short | Nmap : |
title_sort | nmap network exploration and security auditing cookbook a complete guide to mastering nmap and its scripting engine covering practical tasks for penetration testers and system administrators |
title_sub | network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators / |
topic | Computer networks Monitoring Computer programs. Computer networks Security measures Computer programs. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Réseaux d'ordinateurs Surveillance Logiciels. Réseaux d'ordinateurs Sécurité Mesures Logiciels. Tests d'intrusion. COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks Security measures Computer programs fast Penetration testing (Computer security) fast |
topic_facet | Computer networks Monitoring Computer programs. Computer networks Security measures Computer programs. Penetration testing (Computer security) Réseaux d'ordinateurs Surveillance Logiciels. Réseaux d'ordinateurs Sécurité Mesures Logiciels. Tests d'intrusion. COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Computer networks Security measures Computer programs |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1527820 |
work_keys_str_mv | AT calderonpaulino nmapnetworkexplorationandsecurityauditingcookbookacompleteguidetomasteringnmapanditsscriptingenginecoveringpracticaltasksforpenetrationtestersandsystemadministrators |