Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Jeffrey Needham - O'Reilly Media
Internet-scale computing (big data) has more disruptive potential than any information technology in the past. As author points out in this book, big data can provide unprecedented insight into user habits, giving enterprises a huge market advantage.
by Dario J. Toncich - Chrystobel Engineering
The book is specifically designed to provide professionals in the field of manufacturing with the knowledge required to understand the fundamentals, applications and more importantly, the problems of industrial computer communications and networking.
by Sharam Hekmat - PragSoft Corporation
This book is concerned with post-computer communication networks and two of its streams: data communication and telecommunication. It provides a coverage of the key concepts and techniques, so as to prepare readers for more advanced discussions.
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.