Python passive network mapping: P2NMAP
This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operat...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress Publishers, is an imprint of Elsevier
2015
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128027424/?ar |
Zusammenfassung: | This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- |
Beschreibung: | Includes index. - Includes bibliographical references at the end of each chapters and index. - Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015) |
Umfang: | 1 Online-Ressource |
ISBN: | 9780128027424 0128027428 0128027215 9780128027219 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047407263 | ||
003 | DE-627-1 | ||
005 | 20240228115859.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9780128027424 |c electronic bk. |9 978-0-12-802742-4 | ||
020 | |a 0128027428 |c electronic bk. |9 0-12-802742-8 | ||
020 | |a 0128027215 |9 0-12-802721-5 | ||
020 | |a 9780128027219 |9 978-0-12-802721-9 | ||
035 | |a (DE-627-1)047407263 | ||
035 | |a (DE-599)KEP047407263 | ||
035 | |a (ORHE)9780128027424 | ||
035 | |a (DE-627-1)047407263 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Hosmer, Chet |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Python passive network mapping |b P2NMAP |c Chet Hosmer |
264 | 1 | |a Waltham, MA |b Syngress Publishers, is an imprint of Elsevier |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Includes bibliographical references at the end of each chapters and index. - Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015) | ||
520 | |a This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Python (Computer program language) | |
650 | 0 | |a Peer-to-peer architecture (Computer networks) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Python (Langage de programmation) | |
650 | 4 | |a P2P (Réseaux d'ordinateurs) | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 4 | |a Python (Computer program language) | |
776 | 1 | |z 9780128027219 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128027219 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128027424/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047407263 |
---|---|
_version_ | 1821494909576675328 |
adam_text | |
any_adam_object | |
author | Hosmer, Chet |
author_facet | Hosmer, Chet |
author_role | aut |
author_sort | Hosmer, Chet |
author_variant | c h ch |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047407263 (DE-599)KEP047407263 (ORHE)9780128027424 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02581cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047407263</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115859.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027424</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-802742-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128027428</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-802742-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128027215</subfield><subfield code="9">0-12-802721-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027219</subfield><subfield code="9">978-0-12-802721-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047407263</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047407263</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128027424</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047407263</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hosmer, Chet</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Python passive network mapping</subfield><subfield code="b">P2NMAP</subfield><subfield code="c">Chet Hosmer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress Publishers, is an imprint of Elsevier</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references at the end of each chapters and index. - Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">P2P (Réseaux d'ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128027219</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128027219</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128027424/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047407263 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:52Z |
institution | BVB |
isbn | 9780128027424 0128027428 0128027215 9780128027219 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress Publishers, is an imprint of Elsevier |
record_format | marc |
spelling | Hosmer, Chet VerfasserIn aut Python passive network mapping P2NMAP Chet Hosmer Waltham, MA Syngress Publishers, is an imprint of Elsevier 2015 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Includes bibliographical references at the end of each chapters and index. - Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015) This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. -- Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) P2P (Réseaux d'ordinateurs) COMPUTERS ; Security ; Networking Computer networks ; Security measures 9780128027219 Erscheint auch als Druck-Ausgabe 9780128027219 |
spellingShingle | Hosmer, Chet Python passive network mapping P2NMAP Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) P2P (Réseaux d'ordinateurs) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
title | Python passive network mapping P2NMAP |
title_auth | Python passive network mapping P2NMAP |
title_exact_search | Python passive network mapping P2NMAP |
title_full | Python passive network mapping P2NMAP Chet Hosmer |
title_fullStr | Python passive network mapping P2NMAP Chet Hosmer |
title_full_unstemmed | Python passive network mapping P2NMAP Chet Hosmer |
title_short | Python passive network mapping |
title_sort | python passive network mapping p2nmap |
title_sub | P2NMAP |
topic | Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) P2P (Réseaux d'ordinateurs) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
topic_facet | Computer networks Security measures Python (Computer program language) Peer-to-peer architecture (Computer networks) Réseaux d'ordinateurs ; Sécurité ; Mesures Python (Langage de programmation) P2P (Réseaux d'ordinateurs) COMPUTERS ; Security ; Networking Computer networks ; Security measures |
work_keys_str_mv | AT hosmerchet pythonpassivenetworkmappingp2nmap |