|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1138944382 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cnu|||||||| |
007 |
vz czazuu |
008 |
200204s2019 xx --- vleng |
040 |
|
|
|a AU@
|b eng
|c AU@
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|d DST
|
019 |
|
|
|a 1232111568
|a 1300516563
|a 1303325308
|
020 |
|
|
|z 9781839214561
|
024 |
8 |
|
|a 9781839214561
|
029 |
0 |
|
|a AU@
|b 000066431143
|
029 |
1 |
|
|a AU@
|b 000070668815
|
035 |
|
|
|a (OCoLC)1138944382
|z (OCoLC)1232111568
|z (OCoLC)1300516563
|z (OCoLC)1303325308
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sabih, Zaid,
|e author.
|
245 |
1 |
0 |
|a Learn Python and Ethical Hacking from Scratch
|h [electronic resource] /
|c Sabih, Zaid.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 23 hr., 26 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
520 |
|
|
|a Start from scratch and learn both topics simultaneously by writing 20+ hacking programs About This Video Write a remote keylogger that can register all keystrokes and send them by email Interact with files using Python (read, write, and modify them) Convert Python programs to binary executables that work on Windows, OS X, and Linux Convert evil files into Trojans that work and function just like any other file type such as an image or a PDF Write a program that can discover hidden paths in a website Send requests to websites and analyze responses Write a program that can map a website and discover all links, subdomains, files, and directories Run dictionary attacks and guess login information on login pages Write a program that can discover weaknesses in websites In Detail This course is highly practical but doesn't neglect the theory, so we start by covering some basics for ethical hacking and Python programming, installing the required software, and then starting to program straightaway. The course is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system, so we start by learning how this system works and its weaknesses. Then you'll learn how to write a Python program to exploit these weaknesses and hack the system; as we write the program, the author will teach you Python programming from scratch covering one topic at a time. Thus, by the end of the course, you will have written several ethical hacking programs by yourself (see below) via backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools; and the list goes on. You'll also have a deep understanding of how computer systems work, how to model problems, and how to design an algorithm to solve problems and implement the solution using Python. So, by the end of the course, you'll have the programming skills to write any program even if it has nothing to do with hacking, but you'll learn to program by programming hacking tools!
|
538 |
|
|
|a Mode of access: World Wide Web.
|
542 |
|
|
|f Packt Publishing
|g 2019
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title screen (viewed October 11, 2019)
|
533 |
|
|
|a Electronic reproduction.
|b Boston, MA :
|c Safari.
|n Available via World Wide Web.,
|d 2019.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
655 |
|
4 |
|a Electronic videos.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
|
|
|z 1-83921-456-2
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781839214561/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|