Academic literature on the topic 'Nmap'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Nmap.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Nmap"
WARD, ROD, ROSS SCRIVENER, and NICOLA SMART. "NMAP." CIN: Computers, Informatics, Nursing 22, no. 4 (2004): 227–31. http://dx.doi.org/10.1097/00024665-200407000-00011.
Full textSudirman, Dede, and Akma Nurul Yaqin. "Network Penetration dan Security Audit Menggunakan Nmap." SATIN - Sains dan Teknologi Informasi 7, no. 1 (June 14, 2021): 32–44. http://dx.doi.org/10.33372/stn.v7i1.702.
Full textFahlevi, Muhammad Reza, and Dini Ridha Dwiki Putri. "ANALISIS MONITORING & KINERJA SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN NMAP (STUDI KASUS: RAZ HOTEL & CONVENTION MEDAN)." IT (INFORMATIC TECHNIQUE) JOURNAL 9, no. 1 (June 29, 2021): 35. http://dx.doi.org/10.22303/it.9.1.2021.35-43.
Full textMira Orisa and Michael Ardita. "VULNERABILITY ASSESMENT UNTUK MENINGKATKAN KUALITAS KEMANAN WEB." Jurnal Mnemonic 4, no. 1 (February 22, 2021): 16–19. http://dx.doi.org/10.36040/mnemonic.v4i1.3213.
Full textDwiyatno, Saleh. "ANALISIS MONITORING SISTEM JARINGAN KOMPUTER MENGGUNAKAN SOFTWARE NMAP." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 108–15. http://dx.doi.org/10.30656/prosisko.v7i2.2522.
Full textSilmina, Esi Putri, Arizona Firdonsyah, and Rovalia Adhella Attya Amanda. "ANALISIS KEAMANAN JARINGAN SISTEM INFORMASI SEKOLAH MENGGUNAKAN PENETRATION TEST DAN ISSAF." Transmisi 24, no. 3 (August 22, 2022): 83–91. http://dx.doi.org/10.14710/transmisi.24.3.83-91.
Full textWard, Rod. "NMAP: the UK’s nursing Internet gateway." VINE 33, no. 2 (June 2003): 78–82. http://dx.doi.org/10.1108/03055720310509055.
Full textBai, Jin-He, and Alley E. Watada. "365 Induced Modified Atmosphere Maintains Quality of Packaged Fresh-cut Honeydew Cubes." HortScience 34, no. 3 (June 1999): 506D—506. http://dx.doi.org/10.21273/hortsci.34.3.506d.
Full textHwang, Jungsik, and Minsoo Kim. "Effective Detecting Method of Nmap Idle Scan." JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE 9, no. 1 (July 31, 2019): 1–10. http://dx.doi.org/10.14801/jaitc.2019.9.1.1.
Full textRosário, Marcos. "NUCLEI - Scan rápido e versátil." H2HC Magazine, no. 16 (October 22, 2022): 27–33. http://dx.doi.org/10.47986/16/1.
Full textDissertations / Theses on the topic "Nmap"
Dahlgren, Patrik, Emil Heehrle, and Jim Persson. "Analys av Örkelljunga Utbildningscentrums IT-miljö." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23204.
Full textBerntsson, Marcus. "Penetrationstest." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-12157.
Full textŠimkovič, Peter. "Návrh auditního systému pro kontrolu systémů a služeb v počítačové síti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444575.
Full textAshe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.
Full textTitle from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
Linnér, Samuel. "Graybox-baserade säkerhetstest : Att kostnadseffektivt simulera illasinnade angrepp." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2299.
Full textAtt genomföra ett penetrationstest av en nätverksarkitektur är komplicerat, riskfyllt och omfattande. Denna rapport utforskar hur en konsult bäst genomför ett internt penetrationstest tidseffektivt, utan att utelämna viktiga delar. I ett internt penetrationstest får konsulten ofta ta del av systemdokumentation för att skaffa sig en bild av nätverksarkitekturen, på så sätt elimineras den tid det tar att kartlägga hela nätverket manuellt. Detta medför även att eventuella anomalier i systemdokumentationen kan identifieras. Kommunikation med driftansvariga under testets gång minskar risken för missförstånd och systemkrascher. Om allvarliga sårbarheter identifieras meddelas driftpersonalen omgå-ende. Ett annat sätt att effektivisera testet är att skippa tidskrävande uppgifter som kommer att lyckas förr eller senare, t.ex. lösenordsknäckning, och istället påpeka att orsaken till sårbarheten är att angriparen har möjlighet att testa lösenord obegränsat antal gånger. Därutöver är det lämpligt att simulera vissa attacker som annars kan störa produktionen om testet genomförs i en driftsatt miljö.
Resultatet av rapporten är en checklista som kan tolkas som en generell metodik för hur ett internt penetrationstest kan genomföras. Checklistans syfte är att underlätta vid genomförande av ett test. Processen består av sju steg: förberedelse och planering, in-formationsinsamling, sårbarhetsdetektering och analys, rättighetseskalering, penetrationstest samt summering och rapportering.
A network architecture penetration test is complicated, full of risks and extensive. This report explores how a consultant carries it out in the most time effective way, without overlook important parts. In an internal penetration test the consultant are often allowed to view the system documentation of the network architecture, which saves a lot of time since no total host discovery is needed. This is also good for discovering anomalies in the system documentation. Communication with system administrators during the test minimizes the risk of misunderstanding and system crashes. If serious vulnerabilities are discovered, the system administrators have to be informed immediately. Another way to make the test more effective is to skip time consuming tasks which will succeed sooner or later, e.g. password cracking, instead; point out that the reason of the vulnerability is the ability to brute force the password. It is also appropriate to simulate attacks which otherwise could infect the production of the organization.
The result of the report is a checklist by means of a general methodology of how in-ternal penetration tests could be implemented. The purpose of the checklist is to make it easier to do internal penetration tests. The process is divided in seven steps: Planning, information gathering, vulnerability detection and analysis, privilege escalation, pene-tration test and final reporting.
Andersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Full textIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Pokorný, Josef. "Určení pozice útočníka při pokusu o neoprávněný přístup do operačního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220320.
Full textGiorgino, Giuseppe. "Analisi di attacchi basati su port scanning." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8236/.
Full textSimons, William R. "The challenges of network security remediation at a regional university." [Johnson City, Tenn. : East Tennessee State University], 2005. http://etd-submit.etsu.edu/etd/theses/available/etd-0209105-075524/unrestricted/SimonsW022105f.pdf.
Full textTitle from electronic submission form. ETSU ETD database URN: etd-0209105-075524 Includes bibliographical references. Also available via Internet at the UMI web site.
Holešinský, Jan. "Systém pro správu malé podnikové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236085.
Full textBooks on the topic "Nmap"
J, Noonan Wesley, ed. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRGT. Rockland, Mass: Syngress, 2007.
Find full textSeagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Edited by Noonan Wesley J. Rockland, Mass: Syngress, 2006.
Find full textH, Virga Patricia, and National Management Association (U.S.), eds. The NMA handbook for managers. Englewood Cliffs, N.J: Prentice Hall, 1987.
Find full textFood and Agriculture Organization of the United Nations. Kenya. National medium term priority framework: NMTP 2009-2013. Nairobi: FAO, 2009.
Find full textRamos, Angel. NMIP Multicultural Interpreter Issues from the Deaf Multicultural Perspective. S.l: National Multicultural Interpreter Project (NMIP), 2000.
Find full textBook chapters on the topic "Nmap"
Sinha, Sanjib. "Importing Nmap Module." In Beginning Ethical Hacking with Python, 159–63. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_23.
Full textRahalkar, Sagar. "Introduction to NMAP." In Quick Start Guide to Penetration Testing, 1–45. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4270-4_1.
Full textSinha, Sanjib. "Building an Nmap Network Scanner." In Beginning Ethical Hacking with Python, 165–68. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_24.
Full textEssaadi, Driss, Jalal Laassiri, and Sanae Hanaoui. "Using NMAP for Data Collection in Cloud Platform." In Advances in Intelligent Systems and Computing, 507–17. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36674-2_51.
Full textMedeiros, João Paulo S., Agostinho M. Brito, and Paulo S. Motta Pires. "A Data Mining Based Analysis of Nmap Operating System Fingerprint Database." In Advances in Intelligent and Soft Computing, 1–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04091-7_1.
Full textKumar, Kapil, and Manju Khari. "Architecture of Digital Twin for Network Forensic Analysis Using Nmap and Wireshark." In Digital Twin Technology, 83–104. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003132868-5.
Full textEmmanuel, O. Igbekele, A. Adebiyi Ayodele, A. Marion Adebiyi, and B. Francis Osang. "Windows Firewall Bypassing Techniques: An Overview of HTTP Tunneling and Nmap Evasion." In Computational Science and Its Applications – ICCSA 2021, 546–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87013-3_41.
Full textGooch, Jan W. "NMA." In Encyclopedic Dictionary of Polymers, 487. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_7925.
Full textComanducci, Luca. "Intelligent Networked Music Performance Experiences." In Special Topics in Information Technology, 119–30. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15374-7_10.
Full textGuo, Jian, Yu Sasaki, Lei Wang, and Shuang Wu. "Cryptanalysis of HMAC/NMAC-Whirlpool." In Advances in Cryptology - ASIACRYPT 2013, 21–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-42045-0_2.
Full textConference papers on the topic "Nmap"
Li, Zhe, Bo Chen, Wu-chang Feng, and Fei Xie. "Concolic Execution of NMap Scripts for Honeyfarm Generation." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3474370.3485660.
Full textLiao, Si, Chenming Zhou, Yonghui Zhao, Zhiyu Zhang, Chengwei Zhang, Yayu Gao, and Guohui Zhong. "A Comprehensive Detection Approach of Nmap: Principles, Rules and Experiments." In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00020.
Full textShah, Mujahid, Sheeraz Ahmed, Khalid Saeed, Muhammad Junaid, Hamayun Khan, and Ata-ur-rehman. "Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool." In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2019. http://dx.doi.org/10.1109/icomet.2019.8673520.
Full textKang, Ki-Dong, Gyeongseo Park, Hyosang Kim, Mohammad Alian, Nam Sung Kim, and Daehoon Kim. "NMAP: Power Management Based on Network Packet Processing Mode Transition for Latency-Critical Workloads." In MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3466752.3480098.
Full textGhanem, Waheed Ali H. M., and Bahari Belaton. "Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework." In 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE). IEEE, 2013. http://dx.doi.org/10.1109/iccsce.2013.6719998.
Full textRohrmann, Rodney R., Vincent J. Ercolani, and Mark W. Patton. "Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range." In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004906.
Full textFangohr, Hans, Maximilian Albert, and Matteo Franchin. "Nmag micromagnetic simulation tool." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897676.2897677.
Full textTan, Jinhao, Jianrong Zhou, Yushou Song, Wenqin Yang, Jianjin Zhou, Yuanguang Xia, Hui Liu, et al. "Performance Evaluation of Boron Doped NMCP Used in Neutron Radiography." In 2022 29th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/icone29-92974.
Full textNunez, Juan, Jose M. Quintana, and Maria J. Avedillo. "Design of RTD-Based NMIN/NMAX Gates." In 2008 8th IEEE Conference on Nanotechnology (NANO). IEEE, 2008. http://dx.doi.org/10.1109/nano.2008.155.
Full textMeyer, Esther, Frank Bergner, Rainer Raupach, Thomas Flohr, and Marc Kachelriess. "Normalized metal artifact reduction (NMAR) in computed tomography." In 2009 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nssmic.2009.5401721.
Full textReports on the topic "Nmap"
Czech, Joseph J., and Kenneth J. Plotkin. NMAP 7.0 User's Manual. Fort Belvoir, VA: Defense Technical Information Center, November 1998. http://dx.doi.org/10.21236/ada406645.
Full textChi, S. W., C. H. Lee, J. S. Chen, M. J. Roth, and Thomas R. Slawson. Nonlinear Meshfree Analysis Program (NMAP) Version 1.0 (User's Manual). Fort Belvoir, VA: Defense Technical Information Center, December 2012. http://dx.doi.org/10.21236/ada576149.
Full textSparks, Paul, Jesse Sherburn, William Heard, and Brett Williams. Penetration modeling of ultra‐high performance concrete using multiscale meshfree methods. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41963.
Full textPope, Noah Gale, and Christopher Hobbs. NMAC case studies: NMAC discovers leak of radioactive liquid at THORP, Sellafield Plant, UK. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1215824.
Full textKarpius, Peter Joseph. NDA & NMAC at LANL Overview. Office of Scientific and Technical Information (OSTI), August 2019. http://dx.doi.org/10.2172/1558957.
Full textWest, Rebecca Lynn. Nuclear Security Objectives of an NMAC System. Office of Scientific and Technical Information (OSTI), January 2018. http://dx.doi.org/10.2172/1416266.
Full textPerkins, Colin, Aaron Griggs, Jaroslav Flidr, Ron Riley, and Maryann Perez. Next Generation Internet (NGI) Multicast Applications and Architecture (NMAA). Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada411010.
Full textNemer, Leda, Winfrida Mayilla, Kathrin Demmler, Laura Platenkamp, and Sharelle Polack. Nutrition governance in Tanzania. Lessons Learnt from Implementing the National Multisectoral Nutrition Action Plan (NMNAP). Global Alliance for Improved Nutrition (GAIN), May 2020. http://dx.doi.org/10.36072/wp.5.
Full textCarman, Brian E. Mapping Initiatives and Streamlining Processes: An Evaluation of Civil Service Hiring at Naval Medical Center Portsmouth (NMCP). Fort Belvoir, VA: Defense Technical Information Center, January 2008. http://dx.doi.org/10.21236/ada493594.
Full textGallegos, Robert M. Sandia Canyon Temperature Investigation - Perennial Reach of Sandia Canyon Classified Segment - 20.6.4.126 NMAC Assessment Unit NM-9000.A_47. Office of Scientific and Technical Information (OSTI), December 2018. http://dx.doi.org/10.2172/1484624.
Full text