|Eingestellt in Kategorie:
Dieser Artikel ist nicht mehr vorrätig.
Ähnlichen Artikel verkaufen?

Gray Hat Python: Python Programming for - Paperback, by Seitz Justin - Good j

BooksRun
(156531)
Angemeldet als gewerblicher Verkäufer
US $6,46
Ca.CHF 5,14
Artikelzustand:
Gut
Versand:
Kostenlos USPS Media MailTM.
Standort: Philadelphia, Pennsylvania, USA
Lieferung:
Lieferung zwischen Di, 29. Jul und Mo, 4. Aug nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:146599782456
Zuletzt aktualisiert am 19. Jul. 2025 01:53:18 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Book Title
Gray Hat Python: Python Programming for Hackers and Reverse Engin
ISBN
9781593271923

Über dieses Produkt

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593271921
ISBN-13
9781593271923
eBay Product ID (ePID)
70953083

Product Key Features

Number of Pages
216 Pages
Language
English
Publication Name
Gray Hat Python : Python Programming for Hackers and Reverse Engineers
Publication Year
2009
Subject
Security / General, Security / Viruses & Malware, Security / Networking, Programming Languages / Python
Type
Textbook
Subject Area
Computers
Author
Justin Seitz
Format
Trade Paperback

Dimensions

Item Height
0.5 in
Item Weight
15 Oz
Item Length
9.2 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2009-009107
Reviews
"I can recommend Gray Hat Python to all people who want to get an overview of hacking tools and hacking techniques that make use of Python. It is a no-nonsense book which follows a simple recipe: give a brief overview of a hacking technique and then dive straight into a real-world example." --The-Interweb.com "A headfirst dive into the day-to-day coding all app pentesters end up doing." --Thomas Ptacek Gray Hat Python "succeeded in showing me with relative ease how a trained security researcher or determined hacker could use relatively straightforward Python scripts to infiltrate the most prevalent consumer operating system today." --Dr. Dobb's CodeTalk "Justin does a great job elaborating the code examples used throughout [Gray Hat Python]. . . Chapter 3 is just downright awesome." --Carnal0wnage Gray Hat Python "is a must for all people who deal with security on a technical level." --Geek at Large "This book was a joy to read." --Kramses blog Gray Hat Python "is really well-written and has a nice structure which is common among No Starch Press books; that is, more code less talk." --Xorl.wordpress.com "If you use python for your day-to-day scripting and perform some reverse engineering/debugging/fuzzing tasks, then this definitely a book that is bound to catch your attention." --int 2Eh "I recommend the book. . . It's a good book to help security engineers use python to begin analyzing software vulnerabilities. Primarily it's a book about using python to debug and to a lesser degree fuzz. It's a good insight into how Immunity does things and will help you look at CANVAS code a little easier. For that alone it's definitely worth buying." --cyberwart
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Introduction Chapter 1: Setting Up Your Development Environment Chapter 2: Debuggers and Debugger Design Chapter 3: Building a Windows Debugger Chapter 4: PYDBG: A Pure Python Windows Debugger Chapter 5: Immunity Debugger: The Best of Both Worlds Chapter 6: Hooking Chapter 7: DLL and Code Injection Chapter 8: Fuzzing Chapter 9: Sulley Chapter 10: Fuzzing Windows Drivers Chapter 11: IDAPython-Scripting IDAPro Chapter 12: Pyemu-The Scriptable Emulator Index
Edition Description
New Edition,Combined Volume
Synopsis
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it. You'll learn how to: Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?, Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools--and how to build your own when the pre-built ones won't cut it. You'll learn how to: -Automate tedious reversing and security tasks -Design and program your own debugger -Learn how to fuzz Windows drivers and create powerful fuzzers from scratch -Have fun with code and library injection, soft and hard hooking techniques, and other software trickery -Sniff secure traffic out of an encrypted web browser session -Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?, Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum ......, Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools and how to build your own when the pre-built ones won't cut it. You'll learn how to: Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?
LC Classification Number
QA76.9.A25S457 2009

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

BooksRun

99,2% positive Bewertungen835 Tsd. Artikel verkauft

Mitglied seit Aug 2014
Angemeldet als gewerblicher Verkäufer
BooksRun is an online seller of new and used books and textbooks. Best prices for books since 2014, we're a one-stop shop for all sorts of books, from fiction to textbooks. We're constantly expanding ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Beliebte Kategorien in diesem Shop

Verkäuferbewertungen (173'150)

Alle Bewertungen
Positiv
Neutral
Negativ
    • x***e (6)- Bewertung vom Käufer.
      Letzter Monat
      Bestätigter Kauf
      Like new condition, Great buy
    Alle Bewertungen ansehen