Fighting cyber threats, fraud, or both – Join IBM Cyber Beat Live on JULY 26, 2016 | 12:30PM ET (11:30AM CT)
Many of us have been victims of a fraud attack—often, multiple times in one...
This month we have decided to devote the current issue to Nmap. Some of you have most likely used Nmap sometime or another, while others use it on a daily basis for network discovery and security auditing. Besides those functions, there are many more useful options that come with this utility. Our authors have attempted to extensively describe what can be done with Nmap and how it can be done. This month: Ali Hadi will take you on a journey through Nmap – from basic to advanced techniques. While David Harrison and Sherri Davidoff will discuss network forensics. Avery Buffington will describe the different techniques in Nmap, Ncat, and Nping. Sahil Khan will give you a detailed description of Nmap and its most important features. While Matthew Conley will give you an overview of when to use Nmap and what vulnerabilities can be observed.
We hope that you will enjoy reading this issue as much as the authors enjoyed writing their articles.