Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Donna L. Harrington - Cisco Press
Hands-on practice for the CCNP Troubleshooting exam with TCP/IP, LAN, and WAN trouble tickets based on CIT (Cisco Internetwork Troubleshooting) topics. Each chapter contains an overview of protocols, troubleshooting tools, and basic methods.
by Jan-Piet Mens - UIT Cambridge Ltd.
Providing a complete survey of DNS servers, this reference outlines the most suitable types of servers for varying scenarios. Addressing performance and security issues, this resource describes in detail the ideal scenarios for each server.
by Francis daCosta - Springer
'Rethinking the Internet of Things' describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail ...
by Olivier Bonaventure
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.