語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Python passive network mapping = P2N...
~
Hosmer, Chet,
FindBook
Google Book
Amazon
博客來
Python passive network mapping = P2NMAP /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Python passive network mapping/ Chet Hosmer.
其他題名:
P2NMAP /
作者:
Hosmer, Chet,
出版者:
Waltham, MA :Syngress Publishers, is an imprint of Elsevier, : 2015.,
面頁冊數:
1 online resource.
附註:
Includes index.
內容註:
Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 -- Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 -- What You DON'T Know About Your Network
內容註:
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 -- Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment
內容註:
Switch Configuration for Packet CaptureComputing Resources; Storing Captured Data; Storing the Captured Packets -- Python Dictionaries; IPObservationDictionary Class; OSObservationDictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 -- Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis
內容註:
Printing Observations AllPrinting the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Anaysis.py Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 -- PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script
內容註:
Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 -- Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index
標題:
Computer networks - Security measures. -
電子資源:
https://www.sciencedirect.com/science/book/9780128027219
ISBN:
9780128027424 (electronic bk.)
Python passive network mapping = P2NMAP /
Hosmer, Chet,
Python passive network mapping
P2NMAP /[electronic resource] :Chet Hosmer. - Waltham, MA :Syngress Publishers, is an imprint of Elsevier,2015. - 1 online resource.
Includes index.
Includes bibliographical references at the end of each chapters and index.
Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 -- Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 -- What You DON'T Know About Your Network
This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. --
ISBN: 9780128027424 (electronic bk.)
LCCN: 2016439727Subjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Python passive network mapping = P2NMAP /
LDR
:04311cmm a2200349 a 4500
001
2223389
006
o d
007
cnu|unuuu||
008
210114s2015 mau ob 001 0 eng d
010
$a
2016439727
020
$a
9780128027424 (electronic bk.)
020
$a
0128027428 (electronic bk.)
020
$a
9780128027219
020
$a
0128027215
035
$a
(OCoLC)911032843
035
$a
EL2020119
040
$a
N$T
$b
eng
$c
N$T
$d
OPELS
$d
N$T
$d
IDEBK
$d
EBLCP
$d
E7B
$d
UIU
$d
CDX
$d
YDXCP
$d
OCLCF
$d
TEFOD
$d
UMI
$d
DEBSZ
$d
DEBBG
$d
COO
$d
D6H
$d
VT2
$d
LIV
$d
OCLCQ
$d
MERUC
$d
WRM
$d
U3W
$d
CEF
$d
OCLCQ
$d
WYU
$d
CUY
$d
LOA
$d
OCLCQ
$d
ZCU
$d
G3B
041
0
$a
eng
050
4
$a
TK5105.59
082
0 4
$a
005.8
$2
23
100
1
$a
Hosmer, Chet,
$e
author.
$3
3398857
245
1 0
$a
Python passive network mapping
$h
[electronic resource] :
$b
P2NMAP /
$c
Chet Hosmer.
260
$a
Waltham, MA :
$b
Syngress Publishers, is an imprint of Elsevier,
$c
2015.
300
$a
1 online resource.
500
$a
Includes index.
504
$a
Includes bibliographical references at the end of each chapters and index.
505
0
$a
Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 -- Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 -- What You DON'T Know About Your Network
505
8
$a
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 -- Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment
505
8
$a
Switch Configuration for Packet CaptureComputing Resources; Storing Captured Data; Storing the Captured Packets -- Python Dictionaries; IPObservationDictionary Class; OSObservationDictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 -- Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis
505
8
$a
Printing Observations AllPrinting the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Anaysis.py Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 -- PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script
505
8
$a
Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 -- Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index
520
$a
This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. --
$c
Edited summary from book.
588
0
$a
Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015).
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Python (Computer program language)
$3
729789
650
0
$a
Peer-to-peer architecture (Computer networks)
$3
834376
655
4
$a
Electronic books.
$2
lcsh
$3
542853
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128027219
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9395920
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入