Bild 1 von 1

Galerie
Bild 1 von 1

Ähnlichen Artikel verkaufen?
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers a
US $20,38
Ca.CHF 16,40
oder Preisvorschlag
Bisher US $29,75 (- 31%)
Artikelzustand:
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
US $3,99 (ca. CHF 3,21) Standard Shipping.
Standort: Woodbridge, Virginia, USA
Lieferung:
Lieferung zwischen Di, 2. Dez und Fr, 5. Dez nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
Info zum Artikel
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:157503016235
Artikelmerkmale
- Artikelzustand
- Book Title
- Violent Python: A Cookbook for Hackers,
- ISBN
- 9781597499576
Über dieses Produkt
Product Identifiers
Publisher
Elsevier Science & Technology Books
ISBN-10
1597499579
ISBN-13
9781597499576
eBay Product ID (ePID)
154372342
Product Key Features
Number of Pages
288 Pages
Publication Name
Violent Python : A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Language
English
Subject
Programming Languages / General, Mobile & Wireless Communications, Security / General, Programming Languages / Python
Publication Year
2012
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Trade Paperback
Dimensions
Item Height
0.6 in
Item Weight
17.8 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Scholarly & Professional
Dewey Edition
23
Reviews
"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." -Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." -James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." -Raphael Mudge, Creator of Armitage, "An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it." --Reference and Research Book News, August 2013 "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title... The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be... useful tips and tricks will surely be acquired simply by working through the exercises." --The Ethical Hacker Network, February 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm." --The Ethical Hacker Network, February 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." --James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." --Raphael Mudge, Creator of Armitage, "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title. The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be. useful tips and tricks will surely be acquired simply by working through the exercises."--The Ethical Hacker Network, February 27, 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."--The Ethical Hacker Network, February 27, 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."--Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."--James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."--Raphael Mudge, Creator of Armitage, "An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it."-- Reference and Research Book News, August 2013 "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title. The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be. useful tips and tricks will surely be acquired simply by working through the exercises."-- The Ethical Hacker Network, February 27, 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."-- The Ethical Hacker Network, February 27, 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."-- Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."-- James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."-- Raphael Mudge, Creator of Armitage
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1. Introduction 2. Penetration Testing with Python 3. Forensic Investigations with Python 4. Network Traffic Analysis with Python 5. Wireless Mayhem with Python 6. Web Recon with Python 7. Antivirus Evasion with Python
Synopsis
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices Data-mine popular social media websites and evade modern anti-virus, Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
CH Media Store
99,9% positive Bewertungen•23 Tsd. Artikel verkauft
Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
Verkäuferbewertungen (8'282)
- 1***7 (61)- Bewertung vom Käufer.Letzter MonatBestätigter KaufI ordered Real and Functional Analysis by Serge Lang from this seller. The book arrived on time and was extremely well packaged. The condition of the book was exactly as described by the seller, and I could not believe the price for the book. It was a great value for the money. The book's appearance and condition are excellent. I had no issues with this seller. I recommend this seller. For the quality and type of book, you cannot beat the price.
- 6***6 (118)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufReceived the new book and it's much more than just as described. I enjoy reading the book so much that I can't put it down. The purchase price was good and the shipping cost was very reasonable. The new book was packaged in a bubble wrap shipping bag for protection and it arrived very fast. This Seller is AAA+++++ I would recommend them to anyone. Thank You Very Much!!!
- b***r (74)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufShipping was very quick, items packaged securely, better condition than I expected. Description said most were barely used/untouched, definitely matched. Great value. 10/10 seller.
Noch mehr entdecken:
- Robert-A. - Heinlein-Belletristik-Bücher,
- James-A. - Michener-Belletristik-Bücher,
- Michael-A. - Singer-Sachbuch Bücher,
- Deutsche Bücher Robert-A. - Heinlein-Belletristik,
- Robert-A. - Heinlein-Taschenbuch-Belletristik-Bücher,
- Michael-A. - Singer-Taschenbuch-Sachbuch Bücher,
- Michael-A. - Singer-Taschenbuch-Lebensführung-, - Motivation- & - Karriere-Sachbuch Bücher über Selbsthilfe,
- Michael-A. - Singer-Lebensführung-, - Motivation- & - Karriere-Sachbuch Deutsche Bücher über Selbsthilfe,
- Michael-A. - Singer-Taschenbuch-Lebensführung-, - Motivation- & - Karriere-Sachbuch Deutsche Bücher über Selbsthilfe