|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-44437-5 |
003 |
DE-He213 |
005 |
20220114142004.0 |
007 |
cr nn 008mamaa |
008 |
150119s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662444375
|9 978-3-662-44437-5
|
024 |
7 |
|
|a 10.1007/978-3-662-44437-5
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Ballmann, Bastian.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Understanding Network Hacks
|h [electronic resource] :
|b Attack and Defense with Python /
|c by Bastian Ballmann.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 178 p. 26 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index.
|
520 |
|
|
|a This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Compilers (Computer programs).
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Compilers and Interpreters.
|
650 |
2 |
4 |
|a Software Engineering.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662444382
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662444368
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662508626
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-44437-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|