|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn967844934 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
161228s2017 xxu o 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e rda
|e pn
|c IDEBK
|d N$T
|d YDX
|d GW5XE
|d AZU
|d UAB
|d OCLCF
|d COO
|d UPM
|d N$T
|d IOG
|d VT2
|d ESU
|d JBG
|d IAD
|d ICW
|d ICN
|d OTZ
|d K6U
|d OCLCQ
|d LIV
|d OCLCQ
|d IDEBK
|d U3W
|d D6H
|d CAUOI
|d TEFOD
|d VVB
|d EZ9
|d RRP
|d UKMGB
|d WYU
|d UMI
|d STF
|d TOH
|d AUD
|d C6I
|d LEAUB
|d AU@
|d ERF
|d UHL
|d LEATE
|d UKAHL
|d COM
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB8J4608
|2 bnb
|
016 |
7 |
|
|a 019090978
|2 Uk
|
019 |
|
|
|a 967282970
|a 967364809
|a 974650763
|a 981109343
|a 1005772896
|a 1011990625
|a 1048130178
|a 1058647270
|a 1062727983
|a 1066637717
|a 1086542629
|a 1112515667
|a 1112864099
|a 1113330504
|a 1122811816
|a 1129372146
|
020 |
|
|
|a 9781484225417
|q (electronic bk.)
|
020 |
|
|
|a 1484225414
|q (electronic bk.)
|
020 |
|
|
|z 9781484225400
|
020 |
|
|
|z 1484225406
|
024 |
7 |
|
|a 10.1007/978-1-4842-2541-7
|2 doi
|
029 |
1 |
|
|a AU@
|b 000059505725
|
029 |
1 |
|
|a UKMGB
|b 019090978
|
035 |
|
|
|a (OCoLC)967844934
|z (OCoLC)967282970
|z (OCoLC)967364809
|z (OCoLC)974650763
|z (OCoLC)981109343
|z (OCoLC)1005772896
|z (OCoLC)1011990625
|z (OCoLC)1048130178
|z (OCoLC)1058647270
|z (OCoLC)1062727983
|z (OCoLC)1066637717
|z (OCoLC)1086542629
|z (OCoLC)1112515667
|z (OCoLC)1112864099
|z (OCoLC)1113330504
|z (OCoLC)1122811816
|z (OCoLC)1129372146
|
037 |
|
|
|a 985115
|b MIL
|
037 |
|
|
|a 05972DD9-4737-497F-8327-6E1E0523AD92
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.73.P98
|
072 |
|
7 |
|a COM
|x 051360
|2 bisacsh
|
082 |
0 |
4 |
|a 005.13/3
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sinha, Sanjib.
|
245 |
1 |
0 |
|a Beginning ethical hacking with Python /
|c Sanjib Sinha.
|
264 |
|
1 |
|a [United States] :
|b Apress,
|c 2017.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter -- 1. Legal Side of Hacking -- Chapter -- 2. Hacking Environment -- Chapter -- 3. What Is VirtualBox? -- Chapter -- 4. Install Kali Linux & Other OS in VB Chapter -- 5. Linux Terminals and Basic Functionalities -- Chapter 6 -- Role of Python in Ethical Hacking -- Chapter 7 -- Python environment -- Chapter 8 -- General Syntaxes -- Chapter 9 -- Variables, Objects and Values.-l Chapter 10 -- Conditionals Chapter 11 -- How Loops Make Your Life Easier -- Chapter 12 -- Regular Expressions Chapter 13 -- Exceptions, Catching Errors -- Chapter 14 -- Functions -- Chapter 15 -- Classes -- Chapter 16 -- String Methods -- Chapter 17 -- File Input and Output -- Chapter 18 -- Containers -- Chapter 19 -- Database -- Chapter 20 -- Module -- Chapter 21 -- Debugging, UnitTest Module -- Chapter 22 -- Socket and Networking Chapter 23 -- Importing Nmap Module -- Chapter 24 -- Building an Nmap Network Scanner Chapter 25 -- Protect Your Anonymity on Internet -- Chapter 26 -- Dark Web and Tor Chapter 27 -- Proxy Chains -- Chapter 28 -- VPN -- Chapter 29 -- Mac Address.
|
520 |
|
|
|a Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3 See the importance of networking in ethical hacking Gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
0 |
|a Hacking.
|
650 |
2 |
2 |
|a Boidae
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Python.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
|
6 |
|a Python (Langage de programmation)
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Data encryption.
|2 bicssc
|
650 |
|
7 |
|a Programming & scripting languages: general.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Programming Languages
|x Python.
|2 bisacsh
|
650 |
|
7 |
|a Hacking
|2 fast
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Sinha, Sanjib.
|t Beginning ethical hacking with Python.
|d [United States] : Apress, 2017
|z 1484225406
|z 9781484225400
|w (OCoLC)961010715
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484225417/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32378270
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1406773
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis37297807
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13316806
|
994 |
|
|
|a 92
|b IZTAP
|