Cargando…
Python passive network mapping: P2NMAP
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a defini...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2032008 |
_version_ | 1780947494340919296 |
---|---|
author | Hosmer, Chet |
author_facet | Hosmer, Chet |
author_sort | Hosmer, Chet |
collection | CERN |
description | Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important |
id | cern-2032008 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | Syngress |
record_format | invenio |
spelling | cern-20320082021-04-21T20:10:28Zhttp://cds.cern.ch/record/2032008engHosmer, ChetPython passive network mapping: P2NMAPComputing and ComputersPython Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantSyngressoai:cds.cern.ch:20320082015 |
spellingShingle | Computing and Computers Hosmer, Chet Python passive network mapping: P2NMAP |
title | Python passive network mapping: P2NMAP |
title_full | Python passive network mapping: P2NMAP |
title_fullStr | Python passive network mapping: P2NMAP |
title_full_unstemmed | Python passive network mapping: P2NMAP |
title_short | Python passive network mapping: P2NMAP |
title_sort | python passive network mapping: p2nmap |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2032008 |
work_keys_str_mv | AT hosmerchet pythonpassivenetworkmappingp2nmap |