Your Waterstones card is changing, introducing...
Nmap in the Enterprise: Your Guide to Network Scanning (Paperback)
  • Nmap in the Enterprise: Your Guide to Network Scanning (Paperback)

Nmap in the Enterprise: Your Guide to Network Scanning (Paperback)

(author), (author)
Paperback 264 Pages / Published: 10/04/2008
  • We can order this

Usually despatched within 3 weeks

  • This item has been added to your basket
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.

Publisher: Syngress Media,U.S.
ISBN: 9781597492416
Number of pages: 264
Weight: 550 g
Dimensions: 235 x 191 x 17 mm

Russ Rogers is co-founder, CEO, CTO and Principal Security Consultant for Security Horizon, Inc. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. He also serves as the Professor of Network Security at the University of Advancing Technology ( in Tempe, AZ. ?My career is based on performing network evaluations and penetration tests on customer networks to find security holes. A significant part of my job is understanding the specifics of what machines, services, and applications are available to attack on those networks. This is normally the first step in any network security work. Although there are certainly multiple tools available that could be used for this, the industry agrees (by huge majority) that NMAP is the best tool for the job. It provides mandatory functions, such as service identification and verification, but also provides the added capabilities for identifying the host operating system and utilizing a variety of port scans methods, depending on the job requirements. Many of the options within NMAP are no longer documented within the help files, requiring users of the product to keep their own notes or perform extensive web searches looking for the appropriate command line options to use. It is my opinion that a Syngress book on the NMAP tool would provide an invaluable reference to individuals depending on the NMAP tool. What a great benefit it would be to reach over and take a reference from the book shelf. Of course, all truly useful reference books need a qualified author who understands the underlying details. I believe Angela Orebaugh has the background and network knowledge to write a comprehensive and valuable reference book on NMAP. Angela has already authored books on intrusion detection, Snort IDS, and packet sniffing using Snort. The understanding of networks and protocols required to write on those topics is mandatory when authoring a reference on port scanning. It is my hope that Ms. Orebaugh can de-mystify some of the basic operations of the port scans and provide a much needed tutorial on how each scan works and why it might be useful in each situation.? Richard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

You may also be interested in...

The Art of Deception
Added to basket
The Web Application Hacker's Handbook
Added to basket
Enterprise Integration Patterns
Added to basket
Carry On
Added to basket
A Brief Guide to Cloud Computing
Added to basket
The Art of Intrusion
Added to basket
Building Microservices
Added to basket
Nmap Network Scanning
Added to basket
Data Smart
Added to basket
Added to basket
The Basics of Information Security
Added to basket
Computer Networking First-Step
Added to basket


Please sign in to write a review

Your review has been submitted successfully.