語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Beginning ethical hacking with Python
~
Sinha, Sanjib.
FindBook
Google Book
Amazon
博客來
Beginning ethical hacking with Python
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Beginning ethical hacking with Python/ by Sanjib Sinha.
作者:
Sinha, Sanjib.
出版者:
Berkeley, CA :Apress : : 2017.,
面頁冊數:
xix, 201 p. :ill., digital ;24 cm.
內容註:
Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. What Is VirtualBox? -- Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities -- Chapter 6 - Role of Python in Ethical Hacking -- Chapter 7 - Python environment -- Chapter 8 - General Syntaxes -- Chapter 9 - Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 - How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 - Exceptions, Catching Errors -- Chapter 14 - Functions -- Chapter 15 - Classes -- Chapter 16 - String Methods -- Chapter 17 - File Input and Output -- Chapter 18 - Containers -- Chapter 19 - Database -- Chapter 20 - Module -- Chapter 21 - Debugging, UnitTest Module -- Chapter 22 - Socket and Networking Chapter 23 - Importing Nmap Module -- Chapter 24 - Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet -- Chapter 26 - Dark Web and Tor Chapter 27 - Proxy Chains -- Chapter 28 - VPN -- Chapter 29 - Mac Address.
Contained By:
Springer eBooks
標題:
Python (Computer program language) -
電子資源:
http://dx.doi.org/10.1007/978-1-4842-2541-7
ISBN:
9781484225417
Beginning ethical hacking with Python
Sinha, Sanjib.
Beginning ethical hacking with Python
[electronic resource] /by Sanjib Sinha. - Berkeley, CA :Apress :2017. - xix, 201 p. :ill., digital ;24 cm.
Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. What Is VirtualBox? -- Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities -- Chapter 6 - Role of Python in Ethical Hacking -- Chapter 7 - Python environment -- Chapter 8 - General Syntaxes -- Chapter 9 - Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 - How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 - Exceptions, Catching Errors -- Chapter 14 - Functions -- Chapter 15 - Classes -- Chapter 16 - String Methods -- Chapter 17 - File Input and Output -- Chapter 18 - Containers -- Chapter 19 - Database -- Chapter 20 - Module -- Chapter 21 - Debugging, UnitTest Module -- Chapter 22 - Socket and Networking Chapter 23 - Importing Nmap Module -- Chapter 24 - Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet -- Chapter 26 - Dark Web and Tor Chapter 27 - Proxy Chains -- Chapter 28 - VPN -- Chapter 29 - Mac Address.
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3 See the importance of networking in ethical hacking Gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more.
ISBN: 9781484225417
Standard No.: 10.1007/978-1-4842-2541-7doiSubjects--Topical Terms:
729789
Python (Computer program language)
LC Class. No.: QA76.73.P98
Dewey Class. No.: 005.133
Beginning ethical hacking with Python
LDR
:02939nmm a2200289 a 4500
001
2089414
003
DE-He213
005
20170721114618.0
006
m d
007
cr nn 008maaau
008
171013s2017 cau s 0 eng d
020
$a
9781484225417
$q
(electronic bk.)
020
$a
9781484225400
$q
(paper)
024
7
$a
10.1007/978-1-4842-2541-7
$2
doi
035
$a
978-1-4842-2541-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.73.P98
082
0 4
$a
005.133
$2
23
090
$a
QA76.73.P98
$b
S617 2017
100
1
$a
Sinha, Sanjib.
$3
3219985
245
1 0
$a
Beginning ethical hacking with Python
$h
[electronic resource] /
$c
by Sanjib Sinha.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2017.
300
$a
xix, 201 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter - 1. Legal Side of Hacking -- Chapter - 2. Hacking Environment -- Chapter - 3. What Is VirtualBox? -- Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities -- Chapter 6 - Role of Python in Ethical Hacking -- Chapter 7 - Python environment -- Chapter 8 - General Syntaxes -- Chapter 9 - Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 - How Loops Make Your Life Easier -- Chapter 12 - Regular Expressions Chapter 13 - Exceptions, Catching Errors -- Chapter 14 - Functions -- Chapter 15 - Classes -- Chapter 16 - String Methods -- Chapter 17 - File Input and Output -- Chapter 18 - Containers -- Chapter 19 - Database -- Chapter 20 - Module -- Chapter 21 - Debugging, UnitTest Module -- Chapter 22 - Socket and Networking Chapter 23 - Importing Nmap Module -- Chapter 24 - Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet -- Chapter 26 - Dark Web and Tor Chapter 27 - Proxy Chains -- Chapter 28 - VPN -- Chapter 29 - Mac Address.
520
$a
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3 See the importance of networking in ethical hacking Gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more.
650
0
$a
Python (Computer program language)
$3
729789
650
0
$a
Hacking.
$3
2206114
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Python.
$3
3201289
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Data Encryption.
$3
891254
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2541-7
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9315586
電子資源
11.線上閱覽_V
電子書
EB QA76.73.P98
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入