Literatura académica sobre el tema "Nmap"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Nmap".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Nmap"
WARD, ROD, ROSS SCRIVENER y NICOLA SMART. "NMAP". CIN: Computers, Informatics, Nursing 22, n.º 4 (2004): 227–31. http://dx.doi.org/10.1097/00024665-200407000-00011.
Texto completoSudirman, Dede y Akma Nurul Yaqin. "Network Penetration dan Security Audit Menggunakan Nmap". SATIN - Sains dan Teknologi Informasi 7, n.º 1 (14 de junio de 2021): 32–44. http://dx.doi.org/10.33372/stn.v7i1.702.
Texto completoFahlevi, Muhammad Reza y Dini Ridha Dwiki Putri. "ANALISIS MONITORING & KINERJA SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN NMAP (STUDI KASUS: RAZ HOTEL & CONVENTION MEDAN)". IT (INFORMATIC TECHNIQUE) JOURNAL 9, n.º 1 (29 de junio de 2021): 35. http://dx.doi.org/10.22303/it.9.1.2021.35-43.
Texto completoMira Orisa y Michael Ardita. "VULNERABILITY ASSESMENT UNTUK MENINGKATKAN KUALITAS KEMANAN WEB". Jurnal Mnemonic 4, n.º 1 (22 de febrero de 2021): 16–19. http://dx.doi.org/10.36040/mnemonic.v4i1.3213.
Texto completoDwiyatno, Saleh. "ANALISIS MONITORING SISTEM JARINGAN KOMPUTER MENGGUNAKAN SOFTWARE NMAP". PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, n.º 2 (1 de septiembre de 2020): 108–15. http://dx.doi.org/10.30656/prosisko.v7i2.2522.
Texto completoSilmina, Esi Putri, Arizona Firdonsyah y Rovalia Adhella Attya Amanda. "ANALISIS KEAMANAN JARINGAN SISTEM INFORMASI SEKOLAH MENGGUNAKAN PENETRATION TEST DAN ISSAF". Transmisi 24, n.º 3 (22 de agosto de 2022): 83–91. http://dx.doi.org/10.14710/transmisi.24.3.83-91.
Texto completoWard, Rod. "NMAP: the UK’s nursing Internet gateway". VINE 33, n.º 2 (junio de 2003): 78–82. http://dx.doi.org/10.1108/03055720310509055.
Texto completoBai, Jin-He y Alley E. Watada. "365 Induced Modified Atmosphere Maintains Quality of Packaged Fresh-cut Honeydew Cubes". HortScience 34, n.º 3 (junio de 1999): 506D—506. http://dx.doi.org/10.21273/hortsci.34.3.506d.
Texto completoHwang, Jungsik y Minsoo Kim. "Effective Detecting Method of Nmap Idle Scan". JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE 9, n.º 1 (31 de julio de 2019): 1–10. http://dx.doi.org/10.14801/jaitc.2019.9.1.1.
Texto completoRosário, Marcos. "NUCLEI - Scan rápido e versátil". H2HC Magazine, n.º 16 (22 de octubre de 2022): 27–33. http://dx.doi.org/10.47986/16/1.
Texto completoTesis sobre el tema "Nmap"
Dahlgren, Patrik, Emil Heehrle y Jim Persson. "Analys av Örkelljunga Utbildningscentrums IT-miljö". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23204.
Texto completoBerntsson, Marcus. "Penetrationstest". Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-12157.
Texto completoŠimkovič, Peter. "Návrh auditního systému pro kontrolu systémů a služeb v počítačové síti". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444575.
Texto completoAshe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network". [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.
Texto completoTitle from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
Linnér, Samuel. "Graybox-baserade säkerhetstest : Att kostnadseffektivt simulera illasinnade angrepp". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2299.
Texto completoAtt genomföra ett penetrationstest av en nätverksarkitektur är komplicerat, riskfyllt och omfattande. Denna rapport utforskar hur en konsult bäst genomför ett internt penetrationstest tidseffektivt, utan att utelämna viktiga delar. I ett internt penetrationstest får konsulten ofta ta del av systemdokumentation för att skaffa sig en bild av nätverksarkitekturen, på så sätt elimineras den tid det tar att kartlägga hela nätverket manuellt. Detta medför även att eventuella anomalier i systemdokumentationen kan identifieras. Kommunikation med driftansvariga under testets gång minskar risken för missförstånd och systemkrascher. Om allvarliga sårbarheter identifieras meddelas driftpersonalen omgå-ende. Ett annat sätt att effektivisera testet är att skippa tidskrävande uppgifter som kommer att lyckas förr eller senare, t.ex. lösenordsknäckning, och istället påpeka att orsaken till sårbarheten är att angriparen har möjlighet att testa lösenord obegränsat antal gånger. Därutöver är det lämpligt att simulera vissa attacker som annars kan störa produktionen om testet genomförs i en driftsatt miljö.
Resultatet av rapporten är en checklista som kan tolkas som en generell metodik för hur ett internt penetrationstest kan genomföras. Checklistans syfte är att underlätta vid genomförande av ett test. Processen består av sju steg: förberedelse och planering, in-formationsinsamling, sårbarhetsdetektering och analys, rättighetseskalering, penetrationstest samt summering och rapportering.
A network architecture penetration test is complicated, full of risks and extensive. This report explores how a consultant carries it out in the most time effective way, without overlook important parts. In an internal penetration test the consultant are often allowed to view the system documentation of the network architecture, which saves a lot of time since no total host discovery is needed. This is also good for discovering anomalies in the system documentation. Communication with system administrators during the test minimizes the risk of misunderstanding and system crashes. If serious vulnerabilities are discovered, the system administrators have to be informed immediately. Another way to make the test more effective is to skip time consuming tasks which will succeed sooner or later, e.g. password cracking, instead; point out that the reason of the vulnerability is the ability to brute force the password. It is also appropriate to simulate attacks which otherwise could infect the production of the organization.
The result of the report is a checklist by means of a general methodology of how in-ternal penetration tests could be implemented. The purpose of the checklist is to make it easier to do internal penetration tests. The process is divided in seven steps: Planning, information gathering, vulnerability detection and analysis, privilege escalation, pene-tration test and final reporting.
Andersson, Dorothea. "Simulation of industrial control system field devices for cyber security". Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Texto completoIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Pokorný, Josef. "Určení pozice útočníka při pokusu o neoprávněný přístup do operačního systému". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220320.
Texto completoGiorgino, Giuseppe. "Analisi di attacchi basati su port scanning". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8236/.
Texto completoSimons, William R. "The challenges of network security remediation at a regional university". [Johnson City, Tenn. : East Tennessee State University], 2005. http://etd-submit.etsu.edu/etd/theses/available/etd-0209105-075524/unrestricted/SimonsW022105f.pdf.
Texto completoTitle from electronic submission form. ETSU ETD database URN: etd-0209105-075524 Includes bibliographical references. Also available via Internet at the UMI web site.
Holešinský, Jan. "Systém pro správu malé podnikové sítě". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236085.
Texto completoLibros sobre el tema "Nmap"
J, Noonan Wesley, ed. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRGT. Rockland, Mass: Syngress, 2007.
Buscar texto completoSeagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Editado por Noonan Wesley J. Rockland, Mass: Syngress, 2006.
Buscar texto completoH, Virga Patricia y National Management Association (U.S.), eds. The NMA handbook for managers. Englewood Cliffs, N.J: Prentice Hall, 1987.
Buscar texto completoFood and Agriculture Organization of the United Nations. Kenya. National medium term priority framework: NMTP 2009-2013. Nairobi: FAO, 2009.
Buscar texto completoRamos, Angel. NMIP Multicultural Interpreter Issues from the Deaf Multicultural Perspective. S.l: National Multicultural Interpreter Project (NMIP), 2000.
Buscar texto completoCapítulos de libros sobre el tema "Nmap"
Sinha, Sanjib. "Importing Nmap Module". En Beginning Ethical Hacking with Python, 159–63. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_23.
Texto completoRahalkar, Sagar. "Introduction to NMAP". En Quick Start Guide to Penetration Testing, 1–45. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4270-4_1.
Texto completoSinha, Sanjib. "Building an Nmap Network Scanner". En Beginning Ethical Hacking with Python, 165–68. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_24.
Texto completoEssaadi, Driss, Jalal Laassiri y Sanae Hanaoui. "Using NMAP for Data Collection in Cloud Platform". En Advances in Intelligent Systems and Computing, 507–17. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36674-2_51.
Texto completoMedeiros, João Paulo S., Agostinho M. Brito y Paulo S. Motta Pires. "A Data Mining Based Analysis of Nmap Operating System Fingerprint Database". En Advances in Intelligent and Soft Computing, 1–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04091-7_1.
Texto completoKumar, Kapil y Manju Khari. "Architecture of Digital Twin for Network Forensic Analysis Using Nmap and Wireshark". En Digital Twin Technology, 83–104. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003132868-5.
Texto completoEmmanuel, O. Igbekele, A. Adebiyi Ayodele, A. Marion Adebiyi y B. Francis Osang. "Windows Firewall Bypassing Techniques: An Overview of HTTP Tunneling and Nmap Evasion". En Computational Science and Its Applications – ICCSA 2021, 546–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87013-3_41.
Texto completoGooch, Jan W. "NMA". En Encyclopedic Dictionary of Polymers, 487. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_7925.
Texto completoComanducci, Luca. "Intelligent Networked Music Performance Experiences". En Special Topics in Information Technology, 119–30. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15374-7_10.
Texto completoGuo, Jian, Yu Sasaki, Lei Wang y Shuang Wu. "Cryptanalysis of HMAC/NMAC-Whirlpool". En Advances in Cryptology - ASIACRYPT 2013, 21–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-42045-0_2.
Texto completoActas de conferencias sobre el tema "Nmap"
Li, Zhe, Bo Chen, Wu-chang Feng y Fei Xie. "Concolic Execution of NMap Scripts for Honeyfarm Generation". En CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3474370.3485660.
Texto completoLiao, Si, Chenming Zhou, Yonghui Zhao, Zhiyu Zhang, Chengwei Zhang, Yayu Gao y Guohui Zhong. "A Comprehensive Detection Approach of Nmap: Principles, Rules and Experiments". En 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00020.
Texto completoShah, Mujahid, Sheeraz Ahmed, Khalid Saeed, Muhammad Junaid, Hamayun Khan y Ata-ur-rehman. "Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool". En 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2019. http://dx.doi.org/10.1109/icomet.2019.8673520.
Texto completoKang, Ki-Dong, Gyeongseo Park, Hyosang Kim, Mohammad Alian, Nam Sung Kim y Daehoon Kim. "NMAP: Power Management Based on Network Packet Processing Mode Transition for Latency-Critical Workloads". En MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3466752.3480098.
Texto completoGhanem, Waheed Ali H. M. y Bahari Belaton. "Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework". En 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE). IEEE, 2013. http://dx.doi.org/10.1109/iccsce.2013.6719998.
Texto completoRohrmann, Rodney R., Vincent J. Ercolani y Mark W. Patton. "Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range". En 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004906.
Texto completoFangohr, Hans, Maximilian Albert y Matteo Franchin. "Nmag micromagnetic simulation tool". En ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897676.2897677.
Texto completoTan, Jinhao, Jianrong Zhou, Yushou Song, Wenqin Yang, Jianjin Zhou, Yuanguang Xia, Hui Liu et al. "Performance Evaluation of Boron Doped NMCP Used in Neutron Radiography". En 2022 29th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/icone29-92974.
Texto completoNunez, Juan, Jose M. Quintana y Maria J. Avedillo. "Design of RTD-Based NMIN/NMAX Gates". En 2008 8th IEEE Conference on Nanotechnology (NANO). IEEE, 2008. http://dx.doi.org/10.1109/nano.2008.155.
Texto completoMeyer, Esther, Frank Bergner, Rainer Raupach, Thomas Flohr y Marc Kachelriess. "Normalized metal artifact reduction (NMAR) in computed tomography". En 2009 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC 2009). IEEE, 2009. http://dx.doi.org/10.1109/nssmic.2009.5401721.
Texto completoInformes sobre el tema "Nmap"
Czech, Joseph J. y Kenneth J. Plotkin. NMAP 7.0 User's Manual. Fort Belvoir, VA: Defense Technical Information Center, noviembre de 1998. http://dx.doi.org/10.21236/ada406645.
Texto completoChi, S. W., C. H. Lee, J. S. Chen, M. J. Roth y Thomas R. Slawson. Nonlinear Meshfree Analysis Program (NMAP) Version 1.0 (User's Manual). Fort Belvoir, VA: Defense Technical Information Center, diciembre de 2012. http://dx.doi.org/10.21236/ada576149.
Texto completoSparks, Paul, Jesse Sherburn, William Heard y Brett Williams. Penetration modeling of ultra‐high performance concrete using multiscale meshfree methods. Engineer Research and Development Center (U.S.), septiembre de 2021. http://dx.doi.org/10.21079/11681/41963.
Texto completoPope, Noah Gale y Christopher Hobbs. NMAC case studies: NMAC discovers leak of radioactive liquid at THORP, Sellafield Plant, UK. Office of Scientific and Technical Information (OSTI), septiembre de 2015. http://dx.doi.org/10.2172/1215824.
Texto completoKarpius, Peter Joseph. NDA & NMAC at LANL Overview. Office of Scientific and Technical Information (OSTI), agosto de 2019. http://dx.doi.org/10.2172/1558957.
Texto completoWest, Rebecca Lynn. Nuclear Security Objectives of an NMAC System. Office of Scientific and Technical Information (OSTI), enero de 2018. http://dx.doi.org/10.2172/1416266.
Texto completoPerkins, Colin, Aaron Griggs, Jaroslav Flidr, Ron Riley y Maryann Perez. Next Generation Internet (NGI) Multicast Applications and Architecture (NMAA). Fort Belvoir, VA: Defense Technical Information Center, enero de 2003. http://dx.doi.org/10.21236/ada411010.
Texto completoNemer, Leda, Winfrida Mayilla, Kathrin Demmler, Laura Platenkamp y Sharelle Polack. Nutrition governance in Tanzania. Lessons Learnt from Implementing the National Multisectoral Nutrition Action Plan (NMNAP). Global Alliance for Improved Nutrition (GAIN), mayo de 2020. http://dx.doi.org/10.36072/wp.5.
Texto completoCarman, Brian E. Mapping Initiatives and Streamlining Processes: An Evaluation of Civil Service Hiring at Naval Medical Center Portsmouth (NMCP). Fort Belvoir, VA: Defense Technical Information Center, enero de 2008. http://dx.doi.org/10.21236/ada493594.
Texto completoGallegos, Robert M. Sandia Canyon Temperature Investigation - Perennial Reach of Sandia Canyon Classified Segment - 20.6.4.126 NMAC Assessment Unit NM-9000.A_47. Office of Scientific and Technical Information (OSTI), diciembre de 2018. http://dx.doi.org/10.2172/1484624.
Texto completo