Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Download or read it online for free here: