000 03194nam a22004337i 4500
001 2016963222
003 DLC
005 20250203142717.0
008 161222s2017 ii a 001 0 eng d
010 _a 2016963222
020 _a1484225406
_q(paperback)
020 _a9781484225400
_q(paperback)
035 _a(OCoLC)ocn961010715
042 _alccopycat
040 _aYDX
_beng
_erda
_cYDX
_dBTCTA
_dOCLCQ
_dBKL
_dSINLB
_dNUI
_dIAL
_dOCLCF
_dTOH
_dBDX
_dGO3
_dDLC
_dMvI
050 0 0 _aQA76.73.P98
_bS545 2017
100 1 _aSinha, Sanjib,
245 1 0 _aBeginning ethical hacking with Python /
_cSanjib Sinha.
264 1 _aWest Bengal, India :
_bApress,
_c[2017]
300 _axix, 201 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index.
520 _a"Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. [This book] touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: discover the legal constraints of ethical hacking; work with virtual machines and virtualization; develop skills in Python 3; see the importance of networking in ethical hacking; gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more"--Back cover.
505 0 _aPrologue--hacker's goal -- Legal side of hacking -- Hacking environment -- Installing Virtual Box -- Installing Kali Linux and other operating systems on VB -- Linux terminal, basic commands -- Python 3 and ethical hacking -- Python environment -- General syntaxes -- Variables, objects and values -- Conditionals -- Loops -- Regular expressions -- Exceptions, catching errors -- Functions -- Classes -- String methods -- File input and output -- Containers -- Database -- Module -- Debugging, unittest module -- Socket and networking -- Importing Nmap module -- Building an Nmap network scanner -- Protect anonymity on the Internet -- Dark web and Tor -- Proxy chains -- Virtual private netwoork or VPN -- MAC address.
650 0 _aPython (Computer program language)
650 0 _aHacking.
650 0 _aComputer security.
_93672
650 0 _aPenetration testing (Computer security)
650 0 _aComputer programmers
_xProfessional ethics.
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_93672
650 7 _aHacking.
_2fast
_0(OCoLC)fst01909643
650 7 _aPython (Computer program language)
_2fast
_0(OCoLC)fst01084736
948 _au644340
949 _aQA76.73 .P98 S545 2017
_wLC
_c1
_hEY8Z
_i33039001426005
596 _a1
903 _a35430
999 _c35430
_d35430