05140nam 2200673 450 991081899220332120200520144314.00-12-802742-80-12-802721-5(CKB)3710000000422593(EBL)2068785(SSID)ssj0001540142(PQKBManifestationID)11849141(PQKBTitleCode)TC0001540142(PQKBWorkID)11533747(PQKB)10083398(Au-PeEL)EBL2068785(CaPaEBR)ebr11064650(CaONFJC)MIL798693(OCoLC)911032843(CaSebORM)9780128027424(MiAaPQ)EBC2068785(PPN)19866575X(EXLCZ)99371000000042259320150622h20152015 uy 0engur|n|---|||||txtccrPython passive network mapping P2NMAP /Chet Hosmer ; technical editor Gary C. Kessler1st editionWaltham, Massachusetts :Syngress,2015.©20151 online resource (162 p.)Description based upon print version of record.Includes bibliographical references at the end of each chapters and index.Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your NetworkWhat's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping EnvironmentSwitch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing AnalysisPrinting Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint ScriptExecuting P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject IndexPython Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantComputer networksSecurity measuresPython (Computer program language)Peer-to-peer architecture (Computer networks)Computer networksSecurity measures.Python (Computer program language)Peer-to-peer architecture (Computer networks)005.8Hosmer Chet865893Kessler Gary C.MiAaPQMiAaPQMiAaPQBOOK9910818992203321Python passive network mapping4099191UNINA02893nam 22004813 450 991016285440332120230810001801.09781786780645178678064X(CKB)3710000001022488(MiAaPQ)EBC6049054(Au-PeEL)EBL6049054(OCoLC)1156056576(Exl-AI)6049054(EXLCZ)99371000000102248820210901d2017 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGladiators, Pirates and Games of Trust How Game Theory, Strategy and Probability Rule Our Lives :Watkins Media,2017.©2017.1 online resource (139 pages)9781786780102 1786780100 Title -- Contents -- Introduction -- Chapter 1: The Diner’s Dilemma -- Chapter 2: The Blackmailer’s Paradox -- Chapter 3: The Ultimatum Game -- Chapter 4: Games People Play -- Spotlight: The Keynesian Beauty Contest -- Chapter 5: The Marriage Broker -- Intermezzo: The Gladiators Game -- Chapter 6: The Godfather and the Prisoner’s Dilemma -- Chapter 7: Penguin Mathematics -- Intermezzo: The Raven Paradox -- Chapter 8: Going, Going … Gone! -- Intermezzo: The Newcomb Paradox -- Chapter 9: The Chicken Game and the Cuban Missile Crisis -- Chapter 10: Lies, Damned Lies and Statistics -- Chapter 11: Against All Odds -- Chapter 12: On Fairly Sharing a Burden -- Chapter 13: Trust Games -- Chapter 14: How to Gamble If You Must -- Conclusion: Game Theory Guidelines -- Reference Notes -- Bibliography -- CopyrightGenerated by AI.Haim Shapira's book explores the intricacies of Game Theory, blending mathematical rigor with engaging storytelling to elucidate how this theory applies to everyday decision-making. Through various scenarios and dilemmas, such as the Prisoner's Dilemma and the Ultimatum Game, Shapira illustrates the importance of strategic thinking, cooperation, and negotiation. The book aims to entertain while educating, appealing to readers interested in mathematics, psychology, philosophy, and decision sciences. It serves as an accessible introduction to the principles of Game Theory without the heavy reliance on mathematical formulas, targeting a broad audience including those new to the topic.Generated by AI.Gladiators, Pirates and Games of Trust Game theoryGenerated by AIDecision makingGenerated by AIGame theoryDecision making519.3Shapira Haim1379548MiAaPQMiAaPQMiAaPQBOOK9910162854403321Gladiators, Pirates and Games of Trust3419438UNINA