1) Enhance and elaborate on the port scanning and/or enumeration techniques (attacks). Share any additional thoughts you can have on them and describe how they can be detected and/or prevented.
Utilize the Bisection Method in order to determine the first possible root of the following given functions: execute in fifteen (10) iterations/cycle. Present your tabulated solution or spread.
a) f(X) = X^3-2X^2-1 = 0.
b) f(X) = X^6-X-1 = 0.