Python Passive Network Mapping: P2NMAP

Rating: 
Amazon Price: N/A (as of July 24, 2017 03:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.

The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks – they can disrupt operations, crash systems, and – most importantly – miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately.
Continue reading “Python Passive Network Mapping: P2NMAP”

Cyber Security [3 volumes]: Protecting Businesses, Individuals, and the Government from the Next Cyber Attacks

Amazon Price: $194.00 (as of July 24, 2017 10:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.

The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.