Сообщение

Sinha S. - Beginning Ethical Hacking with Python [2017, PDF, ENG]

Сообщение Солнышко » 28 янв 2018, 17:20

Beginning Ethical Hacking with Python
Год издания: 2017
Автор: Sinha S.
Издательство: Apress
ISBN: 978-1484225400
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 201
Описание: Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
- Discover the legal constraints of ethical hacking
- Work with virtual machines and virtualization
- Develop skills in Python 3
- See the importance of networking in ethical hacking
- Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Доп. информация:
Исходный код:
https://github.com/apress/beg-ethical-hacking-w-python
Contents at a Glance
About the Author .............................................................................. xi
About the Technical Reviewer ........................................................ xiii
Acknowledgments ........................................................................... xv
Prologue – Hacker’s Goal ............................................................... xvii
Part I ............................................................................... 1
Chapter 1: Legal Side of Hacking ................................................... 3
Chapter 2: Hacking Environment .................................................... 5
Chapter 3: Installing Virtual Box .................................................... 9
Chapter 4: Installing Kali Linux and
Other Operating Systems on VB ................................................... 13
Chapter 5: Linux Terminal, Basic Commands ............................... 21
Part II ............................................................................ 35
Chapter 6: Python 3 and Ethical Hacking ..................................... 37
Chapter 7: Python Environment .................................................... 39
Chapter 8: General Syntaxes ........................................................ 43
Chapter 9: Variables, Objects and Values ..................................... 49
Chapter 10: Conditionals .............................................................. 67
Chapter 11: Loops ......................................................................... 69
Chapter 12: Regular Expressions ................................................ 75
Chapter 13: Exceptions, Catching Errors ...................................... 81
Chapter 14: Functions .................................................................. 85
Chapter 15: Classes ...................................................................... 97
Chapter 16: String Methods ........................................................ 121
Chapter 17: File Input And Output .............................................. 127
Chapter 18: Containers ............................................................... 129
Chapter 19: Database ................................................................. 137
Chapter 20: Module .................................................................... 149
Chapter 21: Debugging, Unittest Module .................................... 153
Chapter 22: Socket and Networking ........................................... 157
Chapter 23: Importing Nmap Module ......................................... 159
Chapter 24: Building an Nmap Network Scanner ....................... 165
Part III ......................................................................... 169
Chapter 25: Protect Anonymity on the Internet .......................... 171
Chapter 26: Dark Web and Tor .................................................... 173
Chapter 27: Proxy Chains ........................................................... 179
Chapter 28: Virtual Private Network or VPN ............................... 185
Chapter 29: MAC Address ........................................................... 191
Epilogue—What Next .................................................................. 195
Index .............................................................................................. 197

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 28 янв 2018, 17:20
Размер: 3.69 МБ
Размер: 3 868 890 байт
Сидеров: 25
Личеров: 8
Скачали: 0
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 3 месяца 24 дня 8 часов 9 минут 14 секунд назад
Последний личер: 3 месяца 24 дня 8 часов 9 минут 14 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 1.64 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность