Cargando…

The complete Py)thon hacking course.

Master ethical hacking while working on practical Python coding projects. Learn Python hacking skills, ethical hacking principles, penetration testing, cybersecurity, and more with over 17 hours of video tutorials. Designed for those with intermediate- to advanced-level understanding of ethical hack...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Manning Publications, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1379802072
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230523s2023 xx 000 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
019 |a 1390764386 
024 8 |a 10000DIVC202323 
029 1 |a AU@  |b 000074864195 
035 |a (OCoLC)1379802072  |z (OCoLC)1390764386 
037 |a 10000DIVC202323  |b O'Reilly Media 
050 4 |a QA76.73.P98 
082 0 4 |a 005.133  |2 23/eng/20230523 
049 |a UAMI 
245 0 4 |a The complete Py)thon hacking course. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Manning Publications,  |c [2023] 
300 |a 1 online resource (1 video file (17 hr., 3 min.)) :  |b sound, color. 
306 |a 170300 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Joseph Delgadillo, presenter. 
520 |a Master ethical hacking while working on practical Python coding projects. Learn Python hacking skills, ethical hacking principles, penetration testing, cybersecurity, and more with over 17 hours of video tutorials. Designed for those with intermediate- to advanced-level understanding of ethical hacking, this course is still taught in a step-by-step, beginner-friendly method. We begin with coding basic port and vulnerability scanning tools; move onto SSH, FTP, and spoofing attacks; take a look at network analysis; and finish up with coding a reverse shell, command and control center, and several website penetration testing tools. Upon completing this course, you will be prepared for a job in the cybersecurity industry. Learn all these skills while completing eight coding projects: Port and vulnerability scanner SSH brute-forcer MAC address changer ARP spoofer DNS spoofer Multi-functioning reverse shell Keylogger Command and control center. 
588 |a Online resource; title from title details screen (O'Reilly, viewed May 23, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Python (Computer program language) 
650 0 |a Hacking. 
650 0 |a Computer security. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer programmers  |x Professional ethics. 
650 6 |a Python (Langage de programmation) 
650 6 |a Piratage informatique. 
650 6 |a Sécurité informatique. 
650 6 |a Tests d'intrusion. 
650 6 |a Programmeurs  |x Déontologie. 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Delgadillo, Joseph,  |e presenter. 
710 2 |a Manning (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/10000DIVC202323/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP