Well, I think I have practiced all the scanning and atacking technics that is mentioned for more than ten years now.
The book I started up with in the early days was the first issue of hacking-exposed:
http://books.mcgraw-hill.com/sites/osborne/he5/index.htmlDuring the years I think I have practiced all of the methods of this book and some other books as well, but I think I would recomend Hacking Exposed as the best single book source for network security, according to my tast.
I think that the basic principle of security actually is "what works work". Theory can say something about what might work and why. Real testing over time will say what actually does work.
As an exsample: An unmodified sme server might be attached some houndreds or thousands times per day on port 22 using diverce brute force technics. You can see these attacks in the log.
After using an other unstandard port and some other minor modifications I can see that the number of attacks has decreased from some thousands on weekly basis to zero for the last 6 months.
If I did not know bether I would be using that USB key, but as I think it is safe enough from a brute force point of wiew with an average of zero attemps per month, I does not use that key.
When it comes to how networks are scanned, how targets is picked out and etc, I think I know how I have done these things during the years. (But all practice within legal limits.)
Security is not so much a theoretical thing as I will see it. When you connect to Internet or set up a server you will be attacked. That is 100 percent for sure. Then I think it is a good idea to stydy these attacks and to monitor how these attacks is carried out. If you can reduse the nuber of attacks from a level of thousands or more to zero, or a few, you will in most cases have an ok level of security. Filtering sorce ip's will have allmost zero effect as some of these attacks is carried out while warying the source ip, some times for series of packets and some time for individual packets. (Does not understand completely why they does this, but it can be seen in the log or online via a traffic monitor.)