MARC details
000 -LEADER |
fixed length control field |
03828uam a2200397 a 4500 |
001 - CONTROL NUMBER |
control field |
9781786467454 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CaSebORM |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231023143535.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m u |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170601s2017 xx o eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781786467454 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781786467454 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781786461537 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Safari)9781786467454 |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal author |
Calderon, Paulino, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Nmap: |
Subtitle |
Network Exploration and Security Auditing Cookbook - Second Edition |
Medium |
[electronic resource] / |
Statement of responsibility, etc |
Calderon, Paulino. |
250 ## - EDITION |
Edition statement |
2nd edition |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Physical description |
416 p. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
520 ## - Summary |
Summary |
Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z... |
533 ## - REPRODUCTION NOTE |
Type of reproduction |
Electronic reproduction. |
Place of reproduction |
Boston, MA : |
Agency responsible for reproduction |
Safari, |
Note about reproduction |
Available via World Wide Web. |
655 #7 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
710 2# - ADDED CORPORATE NAME |
Added corporate author |
O'Reilly Learning Platform. |
856 40 - ONLINE RESOURCE |
Public note |
Click here to access |
Uniform Resource Identifier |
<a href="https://go.oreilly.com/bradford-college/https://learning.oreilly.com/library/view/nmap-network-exploration/9781786467454/?ar=">https://go.oreilly.com/bradford-college/https://learning.oreilly.com/library/view/nmap-network-exploration/9781786467454/?ar=</a> |
336 ## - CONTENT TYPE |
Content type code |
txt |
337 ## - MEDIA TYPE |
Media type code |
c |
338 ## - CARRIER TYPE |
Carrier type code |
cr |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
542 ## - INFORMATION RELATING TO COPYRIGHT STATUS |
Copyright statement |
Copyright © 2017 Packt Publishing |
550 ## - ISSUING BODY NOTE |
Issuing body note |
Made available through: Safari, an O'Reilly Media Company. |