Cargando…

Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers /

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates h...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: O'Connor, T. J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn819636703
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 121129s2013 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d UIU  |d E7B  |d UMI  |d N$T  |d COO  |d B24X7  |d YDXCP  |d IDEBK  |d DEBSZ  |d TEFOD  |d OCLCF  |d UIU  |d OCLCO  |d MBB  |d TEFOD  |d OCLCQ  |d OCLCO  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d ORE  |d YDX  |d OCLCO  |d LIV  |d OCLCQ  |d SAV  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d COCUF  |d CNNOR  |d STF  |d LOA  |d CEF  |d LANGC  |d K6U  |d VT2  |d CNCEN  |d OCLCQ  |d WYU  |d G3B  |d LVT  |d S8J  |d S9I  |d UAB  |d LEAUB  |d VLY  |d OCLCQ  |d OCLCO  |d LUU  |d OCLCQ  |d OCLCO 
019 |a 825072162  |a 870670155  |a 1162387770 
020 |a 9781597499644  |q (electronic bk.) 
020 |a 1597499641  |q (electronic bk.) 
020 |a 1283808080 
020 |a 9781283808088 
020 |z 9781597499576 
020 |z 1597499579 
029 1 |a AU@  |b 000050492469 
029 1 |a AU@  |b 000050608562 
029 1 |a AU@  |b 000066217818 
029 1 |a CHNEW  |b 000721352 
029 1 |a CHNEW  |b 001010817 
029 1 |a DEBBG  |b BV041121040 
029 1 |a DEBBG  |b BV042305256 
029 1 |a DEBSZ  |b 396759610 
029 1 |a DEBSZ  |b 401301389 
029 1 |a NZ1  |b 15189149 
035 |a (OCoLC)819636703  |z (OCoLC)825072162  |z (OCoLC)870670155  |z (OCoLC)1162387770 
037 |a CL0500000186  |b Safari Books Online 
037 |a 8D31DAD4-A741-41BF-9A3D-4D6D740B9C22  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.73.P98  |b O26 2013 
072 7 |a COM  |x 051310  |2 bisacsh 
072 7 |a COM  |x 051280  |2 bisacsh 
072 7 |a COM  |x 051130  |2 bisacsh 
082 0 4 |a 005.13/3  |2 23 
049 |a UAMI 
100 1 |a O'Connor, T. J. 
245 1 0 |a Violent Python :  |b a cookbook for hackers, forensic analysts, penetration testers and security engineers /  |c T.J. O'Connor. 
260 |a Waltham, MA :  |b Syngress,  |c ©2013. 
300 |a 1 online resource (xxv, 262 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a 1 Introduction -- 2 Penetration Testing with Python -- 3 Forensic Investigations with Python -- 4 Network Traffic Analysis with Python -- 5 Wireless Mayhem with Python -- 6 Web Recon with Python -- 7 Antivirus Evasion with Python. 
520 |a Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. 
588 0 |a Publisher supplied information; title not viewed. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Python (Computer program language) 
650 0 |a Computer security. 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer crimes  |x Investigation. 
650 2 |a Computer Security 
650 6 |a Python (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a COMPUTERS  |x Programming Languages  |x C♯  |2 bisacsh 
650 7 |a COMPUTERS  |x Programming Languages  |x Java.  |2 bisacsh 
650 7 |a COMPUTERS  |x Programming Languages  |x Pascal.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
650 7 |a Python  |g Programmiersprache  |2 gnd 
776 0 8 |i Print version:  |a O'Connor, T.J.  |t Violent Python  |z 9781597499576  |w (DLC) 2012030814  |w (OCoLC)813220708 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499576/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00051017 
938 |a Coutts Information Services  |b COUT  |n 24292648 
938 |a ebrary  |b EBRY  |n ebr10623061 
938 |a EBSCOhost  |b EBSC  |n 486623 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24292648 
938 |a YBP Library Services  |b YANK  |n 9915537 
994 |a 92  |b IZTAP