Security Auditing with NMAP

Security Auditing with NMAP (English, Paperback, Padmavathi Ganapathi)

Share

Security Auditing with NMAP  (English, Paperback, Padmavathi Ganapathi)

Be the first to Review this product
Special price
₹188
270
30% off
i
Available offers
  • Special PriceGet extra 30% off
    T&C
  • Bank Offer5% cashback on Axis Bank Flipkart Debit Card up to ₹750
    T&C
  • Bank Offer5% cashback on Flipkart SBI Credit Card upto ₹4,000 per calendar quarter
    T&C
  • Bank OfferFlat ₹50 off on Flipkart Bajaj Finserv Insta EMI Card. Min Booking Amount: ₹2,500
    T&C
  • Delivery
    Check
    Enter pincode
      Delivery by20 Dec, Saturday
      ?
    View Details
    Author
    Read More
    Highlights
    • Language: English
    • Binding: Paperback
    • Publisher: Notion Press
    • Genre: Education
    • ISBN: 9798889350699
    Services
    • Cash on Delivery available
      ?
    Seller
    NotionPress
    3.8
    • 7 Days Replacement Policy
      ?
  • See other sellers
  • Description
    This book titled “Security Auditing with NMAP” is primarily intends to provide a comprehensive view about the process of security auditing, importance, need, types, auditing standards and procedures for auditing. The main objective of this book is to analyse various security risks in a network and perform auditing methods that help to protect critical data, identify security loopholes, create new security policies and track the effectiveness of security strategies. This book further focuses on an open-source utility tool for network discovery and security auditing, called NMAP. NMAP is one of the important tools in Kali Linux platform for information security tasks. It uses IP packets to determine the hosts available on a network and their services, operating systems and versions, types of packet filters, firewalls and so on. This book facilitates the user to audit the network with various commands and allows a large number of scanning techniques, such as UDP, TCP connect (), TCP SYN (half-open), and FTP. It also offers a wide variety of scan types, including Proxy (bounce attack), ICMP (ping sweep), FIN, ACK sweep, SYN sweep, IP Protocol, and Null scan. It is a useful learning material for students and working professionals who would like to start their career in cyber security audit domain.
    Read More
    Specifications
    Book Details
    Imprint
    • Notion Press
    Dimensions
    Height
    • 8.5 in
    Length
    • 11 in
    Weight
    • 300 gr
    Be the first to ask about this product
    Safe and Secure Payments.Easy returns.100% Authentic products.
    You might be interested in
    Finance And Accounting Books
    Min. 50% Off
    Shop Now
    Politics Books
    Min. 50% Off
    Shop Now
    Other Self-Help Books
    Min. 50% Off
    Shop Now
    General Fiction Books
    Min. 50% Off
    Shop Now
    Back to top