Nmap: (Record no. 69097)

MARC details
000 -LEADER
fixed length control field 03828uam a2200397 a 4500
001 - CONTROL NUMBER
control field 9781786467454
003 - CONTROL NUMBER IDENTIFIER
control field CaSebORM
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231023143535.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m u
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170601s2017 xx o eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781786467454
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781786467454
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781786461537
035 ## - SYSTEM CONTROL NUMBER
System control number (Safari)9781786467454
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
100 1# - MAIN ENTRY--PERSONAL NAME
Personal author Calderon, Paulino,
Relator term author.
245 10 - TITLE STATEMENT
Title Nmap:
Subtitle Network Exploration and Security Auditing Cookbook - Second Edition
Medium [electronic resource] /
Statement of responsibility, etc Calderon, Paulino.
250 ## - EDITION
Edition statement 2nd edition
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Physical description 416 p.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
520 ## - Summary
Summary Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. Learn to develop your own modules for the Nmap Scripting Engine. Become familiar with Lua programming. 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description Who This Book Is For The book is for anyone who wants to master Nmap and its scripting engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine Master basic and advanced techniques to perform port scanning and host discovery Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology Learn how to safely identify and scan critical ICS/SCADA systems Learn how to optimize the performance and behavior of your scans Learn about advanced reporting Learn the fundamentals of Lua programming Become familiar with the development libraries shipped with the NSE Write your own Nmap Scripting Engine scripts In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Z...
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Boston, MA :
Agency responsible for reproduction Safari,
Note about reproduction Available via World Wide Web.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
710 2# - ADDED CORPORATE NAME
Added corporate author O'Reilly Learning Platform.
856 40 - ONLINE RESOURCE
Public note Click here to access
Uniform Resource Identifier <a href="https://go.oreilly.com/bradford-college/https://learning.oreilly.com/library/view/nmap-network-exploration/9781786467454/?ar=">https://go.oreilly.com/bradford-college/https://learning.oreilly.com/library/view/nmap-network-exploration/9781786467454/?ar=</a>
336 ## - CONTENT TYPE
Content type code txt
337 ## - MEDIA TYPE
Media type code c
338 ## - CARRIER TYPE
Carrier type code cr
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
542 ## - INFORMATION RELATING TO COPYRIGHT STATUS
Copyright statement Copyright © 2017 Packt Publishing
550 ## - ISSUING BODY NOTE
Issuing body note Made available through: Safari, an O'Reilly Media Company.
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
      Available online Online Library Online Library Online Resources 12/04/2019   O'Reilly 12/04/2019 12/04/2019 E-book