|
|
|
|
LEADER |
02539nmm a2200445 u 4500 |
001 |
EB000905000 |
003 |
EBX01000000000000000700896 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
141222 ||| eng |
020 |
|
|
|a 9781597499644
|
020 |
|
|
|a 1597499641
|
020 |
|
|
|a 9781597499576
|
020 |
|
|
|a 1597499579
|
100 |
1 |
|
|a O'Connor, T. J.
|
245 |
0 |
0 |
|a Violent Python
|h [electronic resource]
|h Elektronische Ressource
|b a cookbook for hackers, forensic analysts, penetration testers and security engineers
|c T.J. O'Connor
|
260 |
|
|
|a Waltham, MA
|b Syngress
|c 2013, ©2013
|
300 |
|
|
|a online resource (xxv, 262 pages)
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a Python (Computer program language)
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Wireless communication systems / Security measures
|
653 |
|
|
|a Computer crimes / Prevention
|
653 |
|
|
|a Computer crimes / Investigation
|
653 |
|
|
|a Python (Computer program language)
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a COMPUTERS / Programming Languages / C♯ / bisacsh
|
653 |
|
|
|a COMPUTERS / Programming Languages / Java / bisacsh
|
653 |
|
|
|a COMPUTERS / Programming Languages / Pascal / bisacsh
|
653 |
|
|
|a Computer crimes / Investigation / fast / (OCoLC)fst00872065
|
653 |
|
|
|a Computer crimes / Prevention / fast / (OCoLC)fst00872068
|
653 |
|
|
|a Computer security / fast / (OCoLC)fst00872484
|
653 |
|
|
|a Python (Computer program language) / fast / (OCoLC)fst01084736
|
653 |
|
|
|a Wireless communication systems / Security measures / fast / (OCoLC)fst01176222
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b ESD
|a Elsevier ScienceDirect eBooks
|
856 |
4 |
0 |
|u http://www.sciencedirect.com/science/book/9781597499576
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.13/3
|
520 |
|
|
|a Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus
|