Security Auditing with NMAP


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

This book titled “Security Auditing with NMAP” is primarily intends to provide a comprehensive view about the process of security auditing importance need types auditing standards and procedures for auditing. The main objective of this book is to analyse various security risks in a network and perform auditing methods that help to protect critical data identify security loopholes create new security policies and track the effectiveness of security strategies. This book further focuses on an open-source utility tool for network discovery and security auditing called NMAP. NMAP is one of the important tools in Kali Linux platform for information security tasks. It uses IP packets to determine the hosts available on a network and their services operating systems and versions types of packet filters firewalls and so on. This book facilitates the user to audit the network with various commands and allows a large number of scanning techniques such as UDP TCP connect () TCP SYN (half-open) and FTP. It also offers a wide variety of scan types including Proxy (bounce attack) ICMP (ping sweep) FIN ACK sweep SYN sweep IP Protocol and Null scan.         It is a useful learning material for students and working professionals who would like to start their career in cyber security audit domain.
downArrow

Details