tag:blogger.com,1999:blog-4088979.post3013549112946284952..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Review of Nmap Network Scanning PostedRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-11425789635167812092008-12-21T14:36:00.000-05:002008-12-21T14:36:00.000-05:00Good question... I've not read that other book. H...Good question... I've not read that other book. However, Fyodor wrote Nmap. He knows more about it than anyone else. Also, he covers Nmap Scripting Engine which is not addressed elsewhere.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-66519608462793091822008-12-21T14:09:00.000-05:002008-12-21T14:09:00.000-05:00How does this compare to "Secrets of Network Carto...How does this compare to "Secrets of Network Cartography:<BR/><BR/>A Comprehensive Guide to Nmap<BR/><BR/>Second Edition"<BR/><BR/>Written by James "Professor" Messer P@ck3t P1MPhttps://www.blogger.com/profile/17692606169827990107noreply@blogger.com