Deliver toUnited Arab Emirates
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Description:

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals. The reference guide documents every Nmap feature and option, while the remainder demonstrates how to apply them to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Visit http://nmap.org/book for more information and sample chapters.


Editorial Reviews

About the Author

Gordon Lyon (also known by his nickname Fyodor) released Nmap in 1997 and continues to coordinate its development. He also maintains the Insecure.Org, Nmap.Org, SecLists.Org, and SecTools.Org security resource sites and has written seminal papers on OS detection and stealth port scanning. He is a founding member of the Honeynet Project, a popular speaker at security conferences, and co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent". Gordon is President of Computer Professionals for Social Responsibility (CPSR), which has promoted free speech, security, and privacy since 1981.

Reviews:

5.0 out of 5 stars An excellent source on NMAP - directly from the horse's mouth

S.C. · May 3, 2009

nmap is a well-used component of my IT toolbox. I use it primarily for self-discovery (no, not THAT sort of 'self-discovery') - to check my network perimeter, to check the security model inside my network, to figure out who's doing what on my wire, etc. - but I always knew that I was taking advantage of only a small part of its potential.Lyon's book provides a detailed and informative presentation to nmap and its many uses in the professional IT arsenal. While, a fair bit of the material can be gleaned from a wide-assortment of sources on the net (somewhere in those tubes) - including from Lyon's own site, [...] - this book coalesces and distills the material into a tight, cohesive and entertaining presentation with added tidbits that only the author of such a powerful tool might know. And since, like any good tool, using nmap can be dangerous w/o a good user manual, this book provides the need-to-know information for efficient use of nmap.Hell, even if the book sucked, the guy has done such a valuable service by providing this free, open-source tool it seems only fitting that we throw him a couple of bucks for all of his effort. But the book rocks, so it's a two-fer: good-info AND smug feeling of satisfaction that $$ is well spent on someone who actually did something.So: If you want to be in the know you need this book. If you want to know what is on your network you need this book. If you want to keep ahead of those damned script-kiddies you need this book.

5.0 out of 5 stars An Excellent Read and Must Have for your IT Toolkit

A. · April 29, 2011

I purchased this book as part of a graduate level ethical hacking course at WGU. I could simply state that if you're going to use nmap, you need this book. However, for people like me who are just getting started in the world of ethical vulnerability and penetration testing, I needed something comprehensive, complete, and not too "over my head." The author (and his team who he clearly acknowledges in the Introduction) have done a superior job in the writing of this book; the actual writing style is so easy to read and understand. The author takes great care in identifying and acknowledging the various skill set of his potential readers. He provides scenarios, case studies, examples, and detailed descriptions that people like me need and enjoy. He also provides charts, screen prints, and a reference manual for people who want to use this book as a reference only. I am reading this book cover to cover and will be buying my second copy today to keep at my office. Reading this book is like having a discussion with the book's author and since the author also developed the nmap program, I can't think of a better person to learn nmap from. Excellent work Fyodor!

5.0 out of 5 stars Would not hesitate to suggest this to somebody wanting to learn Nmap. Slightly dated, but still a great read to learn Nmap.

K.B.J. · May 12, 2018

The book is slightly dated, but still very informative. I would not hesitate to suggest this book to somebody wanting to learn Nmap. Not only is it a good reference for Nmap options and tunings, it also displays the information in an engaging and informative way from the perspective of a pen tester. I read it like a novel and gained a lot of knowledge about Nmap and network mapping in general.The biggest outdated details are that -sP is now -sn, and that IPv6 is now supported more for Nmap. Beyond that, the functionality is mostly just extended to include new features.

5.0 out of 5 stars Every Security God needs a Bible

J.C. · December 16, 2008

Every Security God needs a Bible, and Fyodor's absolute, incrediblydefinitive guide on Nmap will imbue you with rock-solid scanningstratagems without having to sacrifice the network to lesser tools andtomes.An earlier review mentioned this book, "Is not for the casual nmapuser..." Indeed, Nmap is not a casual tool. No other open-sourcesecurity tool in recent memory (10yrs) matches the potentially bad....andostensibly good events someone could discern from a network.What makes the book unique in its approach is that it was written by thecreator of the tool. Fyodor is a rare combination of first-rateprogrammer and elucidating author, which some might relate to -- how manyof us have used an excellent tool, only to be underwhelmed by the dearthof documentation?This is especially important from a technique/holistic view, meaning thatthe more intricate the security tool, the more potential mayhem one cancreate. It's the difference between knowing your vulnerabilities orfinding out how personally vulnerable you are to pointed questions byangry admins after you brought down the network...or worse.Over half the book goes over features and options I haven't seen onlineanywhere else -- that alone makes the book a worthwhile purchase. Buyingthe book reaffirms the concept that intelligent, well-designed opensource software can be exponentially better than software costingthousands...and you can take that to your Knowledge Bank.-joe

4.0 out of 5 stars Definite Buy for Anyone with an Interest in Security

R. · July 18, 2016

Ordered this to really understand all the bells and whistles of Nmap before taking my PWK (OSCP) course. Regarding the criticism for Fyodor for repeating himself, there is a lot of repetition in the book. However, this actually adds value to book as reference material. Unlike other books, while reading on any topic you do not have to jump around in the book as everything you need is right there in each chapter. Most of the chapters are very easy reading while some get very technical. Not only does the author explain how to use the tool, he explains exactly what Nmap is doing with each command from a technical standpoint. If you plan to make your own network scanning tool, this is the book for you! The book is a bit dated BUT all the updated material is available online for FREE as well as the Nmap change logs.My only criticism lies in the quality of the material not the content (5 star content). The printing is blurred on multiple pages and cover is awkward (after opening once the cover will forever curl out). This is book I would like to keep forever, it would have been nice if it came in hard cover.

Nmap fully explained

P.L. · February 23, 2025

For all nmap users, this is definitely the reference book to own for all purpose. The reader will learn the exact right way to scan hosts and subnets and most importantly the reader will be able to adapt NSE scripts to their specific targets.

Ottimo testo

P. · January 14, 2025

La Bibbia di Nmap completa e pratica un must have per tutti i professionisti di sicurezza informatica e chi sta iniziando in questo mondo. Raccomandato.

All time best

R.B. · March 31, 2025

All time best

Execllent book on Nmap

b.b. · March 22, 2024

For those who want an in-depth understanding of 90% of Nmap this is the book to read, as the book mentions there are lots of other commands and scripts that are not covered, which have been added to recent versions of Nmap. There are lots of pages to read and commands to navigate. well worth the time to obtain the knowledge on Nmap and Zenmap.

Obtuve justo lo que esperaba.

S.M. · March 18, 2021

Excelente empacado, llego en óptimas condiciones ,muy recomendable.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Product ID: U0979958717
Condition: New

4.8

AED29682

Price includes VAT & Import Duties
Type: Paperback
Availability: In Stock

Quantity:

|

Order today to get by 7-14 business days

This item qualifies for free delivery

Returns & Warranty policies

Imported From: United States

At BOLO, we work hard to ensure the products you receive are new, genuine, and sourced from reputable suppliers.

BOLO is not an authorized or official retailer for most brands, nor are we affiliated with manufacturers unless specifically stated on a product page. Instead, we source verified sellers, authorized distributors or directly from the manufacturer.

Each product undergoes thorough inspection and verification at our consolidation and fulfilment centers to ensure it meets our strict authenticity and quality standards before being shipped and delivered to you.

If you ever have concerns regarding the authenticity of a product purchased from us, please contact Bolo Support. We will review your inquiry promptly and, if necessary, provide documentation verifying authenticity or offer a suitable resolution.

Your trust is our top priority, and we are committed to maintaining transparency and integrity in every transaction.

All product information, images, descriptions, and reviews originate from the manufacturer or from trusted sellers overseas. BOLO is not affiliated with, endorsed by, or an authorized retailer for most brands listed on our website unless stated otherwise.

While we strive to display accurate information, variations in packaging, labeling, instructions, or formulation may occasionally occur due to regional differences or supplier updates. For detailed or manufacturer-specific information, please contact the brand directly or reach out to BOLO Support for assistance.

Unless otherwise stated, all prices displayed on the product page include applicable taxes and import duties.

BOLO operates in accordance with the laws and regulations of United Arab Emirates. Any items found to be restricted or prohibited for sale within the UAE will be cancelled prior to shipment. We take proactive measures to ensure that only products permitted for sale in United Arab Emirates are listed on our website.

All items are shipped by air, and any products classified as “Dangerous Goods (DG)” under IATA regulations will be removed from the order and cancelled.

All orders are processed manually, and we make every effort to process them promptly once confirmed. Products cancelled due to the above reasons will be permanently removed from listings across the website.

Similar suggestions by Bolo

More from this brand

Similar items from “CompTIA”

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Product ID: U0979958717
Condition: New

4.8

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning-0
Type: Paperback

AED29682

Price includes VAT & Import Duties
Availability: In Stock

Quantity:

|

Order today to get by 7-14 business days

This item qualifies for free delivery

Returns & Warranty policies

Imported From: United States

At BOLO, we work hard to ensure the products you receive are new, genuine, and sourced from reputable suppliers.

BOLO is not an authorized or official retailer for most brands, nor are we affiliated with manufacturers unless specifically stated on a product page. Instead, we source verified sellers, authorized distributors or directly from the manufacturer.

Each product undergoes thorough inspection and verification at our consolidation and fulfilment centers to ensure it meets our strict authenticity and quality standards before being shipped and delivered to you.

If you ever have concerns regarding the authenticity of a product purchased from us, please contact Bolo Support. We will review your inquiry promptly and, if necessary, provide documentation verifying authenticity or offer a suitable resolution.

Your trust is our top priority, and we are committed to maintaining transparency and integrity in every transaction.

All product information, images, descriptions, and reviews originate from the manufacturer or from trusted sellers overseas. BOLO is not affiliated with, endorsed by, or an authorized retailer for most brands listed on our website unless stated otherwise.

While we strive to display accurate information, variations in packaging, labeling, instructions, or formulation may occasionally occur due to regional differences or supplier updates. For detailed or manufacturer-specific information, please contact the brand directly or reach out to BOLO Support for assistance.

Unless otherwise stated, all prices displayed on the product page include applicable taxes and import duties.

BOLO operates in accordance with the laws and regulations of United Arab Emirates. Any items found to be restricted or prohibited for sale within the UAE will be cancelled prior to shipment. We take proactive measures to ensure that only products permitted for sale in United Arab Emirates are listed on our website.

All items are shipped by air, and any products classified as “Dangerous Goods (DG)” under IATA regulations will be removed from the order and cancelled.

All orders are processed manually, and we make every effort to process them promptly once confirmed. Products cancelled due to the above reasons will be permanently removed from listings across the website.

Description:

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals. The reference guide documents every Nmap feature and option, while the remainder demonstrates how to apply them to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Visit http://nmap.org/book for more information and sample chapters.


Editorial Reviews

About the Author

Gordon Lyon (also known by his nickname Fyodor) released Nmap in 1997 and continues to coordinate its development. He also maintains the Insecure.Org, Nmap.Org, SecLists.Org, and SecTools.Org security resource sites and has written seminal papers on OS detection and stealth port scanning. He is a founding member of the Honeynet Project, a popular speaker at security conferences, and co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent". Gordon is President of Computer Professionals for Social Responsibility (CPSR), which has promoted free speech, security, and privacy since 1981.

Reviews:

5.0 out of 5 stars An excellent source on NMAP - directly from the horse's mouth

S.C. · May 3, 2009

nmap is a well-used component of my IT toolbox. I use it primarily for self-discovery (no, not THAT sort of 'self-discovery') - to check my network perimeter, to check the security model inside my network, to figure out who's doing what on my wire, etc. - but I always knew that I was taking advantage of only a small part of its potential.Lyon's book provides a detailed and informative presentation to nmap and its many uses in the professional IT arsenal. While, a fair bit of the material can be gleaned from a wide-assortment of sources on the net (somewhere in those tubes) - including from Lyon's own site, [...] - this book coalesces and distills the material into a tight, cohesive and entertaining presentation with added tidbits that only the author of such a powerful tool might know. And since, like any good tool, using nmap can be dangerous w/o a good user manual, this book provides the need-to-know information for efficient use of nmap.Hell, even if the book sucked, the guy has done such a valuable service by providing this free, open-source tool it seems only fitting that we throw him a couple of bucks for all of his effort. But the book rocks, so it's a two-fer: good-info AND smug feeling of satisfaction that $$ is well spent on someone who actually did something.So: If you want to be in the know you need this book. If you want to know what is on your network you need this book. If you want to keep ahead of those damned script-kiddies you need this book.

5.0 out of 5 stars An Excellent Read and Must Have for your IT Toolkit

A. · April 29, 2011

I purchased this book as part of a graduate level ethical hacking course at WGU. I could simply state that if you're going to use nmap, you need this book. However, for people like me who are just getting started in the world of ethical vulnerability and penetration testing, I needed something comprehensive, complete, and not too "over my head." The author (and his team who he clearly acknowledges in the Introduction) have done a superior job in the writing of this book; the actual writing style is so easy to read and understand. The author takes great care in identifying and acknowledging the various skill set of his potential readers. He provides scenarios, case studies, examples, and detailed descriptions that people like me need and enjoy. He also provides charts, screen prints, and a reference manual for people who want to use this book as a reference only. I am reading this book cover to cover and will be buying my second copy today to keep at my office. Reading this book is like having a discussion with the book's author and since the author also developed the nmap program, I can't think of a better person to learn nmap from. Excellent work Fyodor!

5.0 out of 5 stars Would not hesitate to suggest this to somebody wanting to learn Nmap. Slightly dated, but still a great read to learn Nmap.

K.B.J. · May 12, 2018

The book is slightly dated, but still very informative. I would not hesitate to suggest this book to somebody wanting to learn Nmap. Not only is it a good reference for Nmap options and tunings, it also displays the information in an engaging and informative way from the perspective of a pen tester. I read it like a novel and gained a lot of knowledge about Nmap and network mapping in general.The biggest outdated details are that -sP is now -sn, and that IPv6 is now supported more for Nmap. Beyond that, the functionality is mostly just extended to include new features.

5.0 out of 5 stars Every Security God needs a Bible

J.C. · December 16, 2008

Every Security God needs a Bible, and Fyodor's absolute, incrediblydefinitive guide on Nmap will imbue you with rock-solid scanningstratagems without having to sacrifice the network to lesser tools andtomes.An earlier review mentioned this book, "Is not for the casual nmapuser..." Indeed, Nmap is not a casual tool. No other open-sourcesecurity tool in recent memory (10yrs) matches the potentially bad....andostensibly good events someone could discern from a network.What makes the book unique in its approach is that it was written by thecreator of the tool. Fyodor is a rare combination of first-rateprogrammer and elucidating author, which some might relate to -- how manyof us have used an excellent tool, only to be underwhelmed by the dearthof documentation?This is especially important from a technique/holistic view, meaning thatthe more intricate the security tool, the more potential mayhem one cancreate. It's the difference between knowing your vulnerabilities orfinding out how personally vulnerable you are to pointed questions byangry admins after you brought down the network...or worse.Over half the book goes over features and options I haven't seen onlineanywhere else -- that alone makes the book a worthwhile purchase. Buyingthe book reaffirms the concept that intelligent, well-designed opensource software can be exponentially better than software costingthousands...and you can take that to your Knowledge Bank.-joe

4.0 out of 5 stars Definite Buy for Anyone with an Interest in Security

R. · July 18, 2016

Ordered this to really understand all the bells and whistles of Nmap before taking my PWK (OSCP) course. Regarding the criticism for Fyodor for repeating himself, there is a lot of repetition in the book. However, this actually adds value to book as reference material. Unlike other books, while reading on any topic you do not have to jump around in the book as everything you need is right there in each chapter. Most of the chapters are very easy reading while some get very technical. Not only does the author explain how to use the tool, he explains exactly what Nmap is doing with each command from a technical standpoint. If you plan to make your own network scanning tool, this is the book for you! The book is a bit dated BUT all the updated material is available online for FREE as well as the Nmap change logs.My only criticism lies in the quality of the material not the content (5 star content). The printing is blurred on multiple pages and cover is awkward (after opening once the cover will forever curl out). This is book I would like to keep forever, it would have been nice if it came in hard cover.

Nmap fully explained

P.L. · February 23, 2025

For all nmap users, this is definitely the reference book to own for all purpose. The reader will learn the exact right way to scan hosts and subnets and most importantly the reader will be able to adapt NSE scripts to their specific targets.

Ottimo testo

P. · January 14, 2025

La Bibbia di Nmap completa e pratica un must have per tutti i professionisti di sicurezza informatica e chi sta iniziando in questo mondo. Raccomandato.

All time best

R.B. · March 31, 2025

All time best

Execllent book on Nmap

b.b. · March 22, 2024

For those who want an in-depth understanding of 90% of Nmap this is the book to read, as the book mentions there are lots of other commands and scripts that are not covered, which have been added to recent versions of Nmap. There are lots of pages to read and commands to navigate. well worth the time to obtain the knowledge on Nmap and Zenmap.

Obtuve justo lo que esperaba.

S.M. · March 18, 2021

Excelente empacado, llego en óptimas condiciones ,muy recomendable.

Similar suggestions by Bolo

More from this brand

Similar items from “CompTIA”