Nmap network exploration and security auditing cookbook / (Record no. 21772)

MARC details
000 -LEADER
fixed length control field 02023nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103028.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781838649357
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.9.A25 .C35 2021
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Calderon, Paulino
Relator term author
245 #0 - TITLE STATEMENT
Title Nmap network exploration and security auditing cookbook /
Statement of responsibility, etc. Paulino Calderon
250 ## - EDITION STATEMENT
Edition statement Third Edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham, UK :
Name of publisher, distributor, etc. Packt Publishing, Limited,
Date of publication, distribution, etc. c2021
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 409 pages ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD50
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Nmap Fundamentals -- Getting Familiar with Nmap's Family -- Network Scanning -- Reconnaissance Tasks -- Scanning Web Servers -- Scanning Databases -- Scanning Mail Servers -- Scanning Windows Systems --Scanning ICS SCADA Systems -- Scanning Mainframes -- Optimizing Scans -- Generating Scan Reports -- Writing Your Own NSE Scripts -- Exploiting Vulnerabilities with the Nmap Scripting Engine -- Appendix A - HTTP, HTTP Pipelining, and Web Crawling Configuration Options -- Appendix B - Brute Force Password Auditing Options -- Appendix C - NSE Debugging -- Appendix D - Additional Output Options -- Appendix E - Introduction to Lua -- Appendix F - References and Additional Reading
520 ## - SUMMARY, ETC.
Summary, etc. The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER -- ACCESS CONTROL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 05/07/2024 Purchased - Amazon 50.00   GC QA 76.9.A25 .C35 2021 NULIB000019531 05/20/2025 c.1 05/20/2025 Books