Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems
Sorry, but this section or chapter of the Nmap book (Nmap
Network Scanning) is not currently available in the free online edition—only in the printed book version (more book information or buy on Amazon).
A practical example: bypassing default Snort 2.2.0 rules