Python passive network mapping: P2NMAP
This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operat...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress Publishers, is an imprint of Elsevier
2015
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9780128027219 http://www.sciencedirect.com/science/book/9780128027219 http://www.sciencedirect.com/science/book/9780128027219 |
Zusammenfassung: | This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- |
Beschreibung: | Includes index Includes bibliographical references at the end of each chapters and index |
Umfang: | 1 online resource (162 pages) Illustrationen |
ISBN: | 9780128027424 0128027428 0128027215 9780128027219 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126872 | ||
003 | DE-604 | ||
005 | 20200828 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 xx a||| o|||| 00||| eng d | ||
020 | |a 9780128027424 |9 978-0-12-802742-4 | ||
020 | |a 0128027428 |9 0-12-802742-8 | ||
020 | |a 0128027215 |9 0-12-802721-5 | ||
020 | |a 9780128027219 |9 978-0-12-802721-9 | ||
035 | |a (ZDB-33-ESD)ocn911032843 | ||
035 | |a (OCoLC)1073739639 | ||
035 | |a (DE-599)BVBBV046126872 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 250 |0 (DE-625)143626: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Hosmer, Chet |e Verfasser |0 (DE-588)1096205777 |4 aut | |
245 | 1 | 0 | |a Python passive network mapping |b P2NMAP |c Chet Hosmer |
264 | 1 | |a Waltham, MA |b Syngress Publishers, is an imprint of Elsevier |c 2015 | |
300 | |a 1 online resource (162 pages) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references at the end of each chapters and index | ||
520 | |a This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- | ||
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Peer-to-peer architecture (Computer networks) |2 fast | |
650 | 7 | |a Python (Computer program language) |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Python (Computer program language) | |
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Python |g Programmiersprache |0 (DE-588)4434275-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Python |g Programmiersprache |0 (DE-588)4434275-5 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128027219 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128027219 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031507325 | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128027219 |l DE-1046 |p ZDB-33-ESD |q FAW_PDA_ESD_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128027219 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818985996105023488 |
---|---|
any_adam_object | |
author | Hosmer, Chet |
author_GND | (DE-588)1096205777 |
author_facet | Hosmer, Chet |
author_role | aut |
author_sort | Hosmer, Chet |
author_variant | c h ch |
building | Verbundindex |
bvnumber | BV046126872 |
classification_rvk | ST 250 ST 277 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn911032843 (OCoLC)1073739639 (DE-599)BVBBV046126872 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03033nam a2200601zc 4500</leader><controlfield tag="001">BV046126872</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200828 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027424</subfield><subfield code="9">978-0-12-802742-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128027428</subfield><subfield code="9">0-12-802742-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128027215</subfield><subfield code="9">0-12-802721-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027219</subfield><subfield code="9">978-0-12-802721-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn911032843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1073739639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126872</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 250</subfield><subfield code="0">(DE-625)143626:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hosmer, Chet</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1096205777</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Python passive network mapping</subfield><subfield code="b">P2NMAP</subfield><subfield code="c">Chet Hosmer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress Publishers, is an imprint of Elsevier</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (162 pages)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Python (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Python</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4434275-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Python</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4434275-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128027219</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128027219</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507325</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128027219</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128027219</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126872 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:43:46Z |
institution | BVB |
isbn | 9780128027424 0128027428 0128027215 9780128027219 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507325 |
oclc_num | 911032843 1073739639 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource (162 pages) Illustrationen |
psigel | ZDB-33-ESD ZDB-33-ESD FAW_PDA_ESD_Kauf ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress Publishers, is an imprint of Elsevier |
record_format | marc |
spelling | Hosmer, Chet Verfasser (DE-588)1096205777 aut Python passive network mapping P2NMAP Chet Hosmer Waltham, MA Syngress Publishers, is an imprint of Elsevier 2015 1 online resource (162 pages) Illustrationen txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references at the end of each chapters and index This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- COMPUTERS / Security / Networking bisacsh Computer networks / Security measures fast Peer-to-peer architecture (Computer networks) fast Python (Computer program language) fast Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Python Programmiersprache (DE-588)4434275-5 gnd rswk-swf Python Programmiersprache (DE-588)4434275-5 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe 9780128027219 http://www.sciencedirect.com/science/book/9780128027219 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Hosmer, Chet Python passive network mapping P2NMAP COMPUTERS / Security / Networking bisacsh Computer networks / Security measures fast Peer-to-peer architecture (Computer networks) fast Python (Computer program language) fast Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Python Programmiersprache (DE-588)4434275-5 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4434275-5 |
title | Python passive network mapping P2NMAP |
title_auth | Python passive network mapping P2NMAP |
title_exact_search | Python passive network mapping P2NMAP |
title_full | Python passive network mapping P2NMAP Chet Hosmer |
title_fullStr | Python passive network mapping P2NMAP Chet Hosmer |
title_full_unstemmed | Python passive network mapping P2NMAP Chet Hosmer |
title_short | Python passive network mapping |
title_sort | python passive network mapping p2nmap |
title_sub | P2NMAP |
topic | COMPUTERS / Security / Networking bisacsh Computer networks / Security measures fast Peer-to-peer architecture (Computer networks) fast Python (Computer program language) fast Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Python Programmiersprache (DE-588)4434275-5 gnd |
topic_facet | COMPUTERS / Security / Networking Computer networks / Security measures Peer-to-peer architecture (Computer networks) Python (Computer program language) Computer networks Security measures Rechnernetz Computersicherheit Python Programmiersprache |
url | http://www.sciencedirect.com/science/book/9780128027219 |
work_keys_str_mv | AT hosmerchet pythonpassivenetworkmappingp2nmap |