Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer
Publisher: NetworkUptime.com 2008
Number of pages: 128
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification, asset management, compliance testing, firewall auditing, and more.
Home page url
Download or read it online for free here:
by Kathy Ivens, Clark Scheffy - USRobotics
We think that if you have more than one computer in your home, you should have a network. That belief has its roots in the fact that we're generally lazy, and we believe everyone should do everything in the easiest possible manner.
by Dario J. Toncich - Chrystobel Engineering
The book is specifically designed to provide professionals in the field of manufacturing with the knowledge required to understand the fundamentals, applications and more importantly, the problems of industrial computer communications and networking.
- IBM Redbooks
This tutorial describes a sampling of technologies of various types. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking, with the applicability of these technologies.
by Diarmuid O'Briain - Free Technology Academy
This book explores the open technologies that are at the foundations of modern computer networks. The Internet is built on top of open protocols and open standards. Open networks use the devices made available by the members of the community.