Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Katta G. Murty - Prentice Hall
This book covers the advances in network flow methods ranging across modeling, applications, algorithms, and computational complexity. It deals with the problems faced on network structures that can be handled by linear programming techniques.
by Matt Smith - MakeUseOf
Home networking doesn't always work as simply as it should, and while every company is making efforts to simplify it, not all attempts have been successful. This guide outlines everything you need to know to manage your own home network.
by Kathy Ivens, Clark Scheffy - USRobotics
We think that if you have more than one computer in your home, you should have a network. That belief has its roots in the fact that we're generally lazy, and we believe everyone should do everything in the easiest possible manner.
by Rahul Banerjee - Prentice-Hall of India
Advanced text on internetworking technologies for senior undergraduate/graduate students of computer science. This unique book provides an introduction to the key concepts related to front line areas of interwork specific research and development.