|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1257076860 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210619s2021 enka o 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d UKMGB
|d OCLCO
|d OCLCF
|d N$T
|d OCLCQ
|d OCLCO
|d OCLCQ
|d CPV
|d IEEEE
|
015 |
|
|
|a GBC188387
|2 bnb
|
016 |
7 |
|
|a 020210281
|2 Uk
|
020 |
|
|
|a 9781838825317
|q (electronic bk.)
|
020 |
|
|
|a 1838825312
|q (electronic bk.)
|
020 |
|
|
|z 9781838829506
|q (pbk.)
|
029 |
1 |
|
|a UKMGB
|b 020210281
|
035 |
|
|
|a (OCoLC)1257076860
|
037 |
|
|
|a 9781838825317
|b Packt Publishing Pvt. Ltd
|
037 |
|
|
|a 10162367
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sarwar, Fahad Ali.,
|e author.
|
245 |
1 |
0 |
|a Python ethical hacking from scratch :
|b think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware /
|c Fahad Ali Sarwar.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing, Limited,
|c 2021.
|
300 |
|
|
|a 1 online resource (214 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Section 1: The nuts and bolts of ethical hacking : the basics. 1. Introduction to hacking -- 2. Getting started : setting up a lab environment -- Section 2: Thinking like a hacker : network information gathering and attacks. 3. Reconnaissance and information gathering -- 4. Network scanning -- 5. Man in the middle attacks -- Section 3: Malware development. 6. Malware development -- 7. Advanced malware -- 8. Post exploitation -- 9. System protection and perseverance.
|
520 |
|
|
|a Penetration testing enables you to evaluate the security or strength of a computer system, network, or web application that an attacker can exploit. With this book, you'll understand why Python is one of the fastest-growing programming languages for penetration testing. You'll find out how to harness the power of Python and pentesting to enhance your system security. Developers working with Python will be able to put their knowledge and experience to work with this practical guide. Complete with step-by-step explanations of essential concepts and practical examples, this book takes a hands-on approach to help you build your own pentesting tools for testing the security level of systems and networks. You'll learn how to develop your own ethical hacking tools using Python and explore hacking techniques to exploit vulnerabilities in networks and systems. Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements. By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Python (Langage de programmation)
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|0 (OCoLC)fst01084736
|
776 |
0 |
8 |
|i Print version:
|a Sarwar, Fahad Ali.
|t Python Ethical Hacking from Scratch.
|d Birmingham : Packt Publishing, Limited, ©2021
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781838829506/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6640537
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2939965
|
994 |
|
|
|a 92
|b IZTAP
|