Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Sharam Hekmat - PragSoft Corporation
This book is concerned with post-computer communication networks and two of its streams: data communication and telecommunication. It provides a coverage of the key concepts and techniques, so as to prepare readers for more advanced discussions.
by Dario J. Toncich - Chrystobel Engineering
The book is specifically designed to provide professionals in the field of manufacturing with the knowledge required to understand the fundamentals, applications and more importantly, the problems of industrial computer communications and networking.
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
This book intends to explain to you the overall utilization that P2P (Peer-to-Peer) technologies have in today's world, it goes deeper into as many implementations as it can and compares the benefits, problems even legal implications.