Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Harry G. Perros - Wiley
Asynchronous Transfer Mode (ATM) has become an integral part of the networking infrastructure. This introductory text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an accessible way.
by Jeffrey Needham - O'Reilly Media
Internet-scale computing (big data) has more disruptive potential than any information technology in the past. As author points out in this book, big data can provide unprecedented insight into user habits, giving enterprises a huge market advantage.
by David Griffin - Crete University Press
This book addresses the technologies and methods required for the management of broadband networks and services. It introduces relevant background information and presents detailed technical descriptions, covering a range of topics.
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.