000 | 03194nam a22004337i 4500 | ||
---|---|---|---|
001 | 2016963222 | ||
003 | DLC | ||
005 | 20250203142717.0 | ||
008 | 161222s2017 ii a 001 0 eng d | ||
010 | _a 2016963222 | ||
020 |
_a1484225406 _q(paperback) |
||
020 |
_a9781484225400 _q(paperback) |
||
035 | _a(OCoLC)ocn961010715 | ||
042 | _alccopycat | ||
040 |
_aYDX _beng _erda _cYDX _dBTCTA _dOCLCQ _dBKL _dSINLB _dNUI _dIAL _dOCLCF _dTOH _dBDX _dGO3 _dDLC _dMvI |
||
050 | 0 | 0 |
_aQA76.73.P98 _bS545 2017 |
100 | 1 | _aSinha, Sanjib, | |
245 | 1 | 0 |
_aBeginning ethical hacking with Python / _cSanjib Sinha. |
264 | 1 |
_aWest Bengal, India : _bApress, _c[2017] |
|
300 |
_axix, 201 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aIncludes index. | ||
520 | _a"Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. [This book] touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: discover the legal constraints of ethical hacking; work with virtual machines and virtualization; develop skills in Python 3; see the importance of networking in ethical hacking; gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more"--Back cover. | ||
505 | 0 | _aPrologue--hacker's goal -- Legal side of hacking -- Hacking environment -- Installing Virtual Box -- Installing Kali Linux and other operating systems on VB -- Linux terminal, basic commands -- Python 3 and ethical hacking -- Python environment -- General syntaxes -- Variables, objects and values -- Conditionals -- Loops -- Regular expressions -- Exceptions, catching errors -- Functions -- Classes -- String methods -- File input and output -- Containers -- Database -- Module -- Debugging, unittest module -- Socket and networking -- Importing Nmap module -- Building an Nmap network scanner -- Protect anonymity on the Internet -- Dark web and Tor -- Proxy chains -- Virtual private netwoork or VPN -- MAC address. | |
650 | 0 | _aPython (Computer program language) | |
650 | 0 | _aHacking. | |
650 | 0 |
_aComputer security. _93672 |
|
650 | 0 | _aPenetration testing (Computer security) | |
650 | 0 |
_aComputer programmers _xProfessional ethics. |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93672 |
|
650 | 7 |
_aHacking. _2fast _0(OCoLC)fst01909643 |
|
650 | 7 |
_aPython (Computer program language) _2fast _0(OCoLC)fst01084736 |
|
948 | _au644340 | ||
949 |
_aQA76.73 .P98 S545 2017 _wLC _c1 _hEY8Z _i33039001426005 |
||
596 | _a1 | ||
903 | _a35430 | ||
999 |
_c35430 _d35430 |