Hands On with Nmap: A Guide to Network Scanning & Vulnerability Assessment