Saturday, 30 June 2012

Violent Python Download

Violent Python
Author: TJ O'Connor
Edition: 1
Binding: Paperback
ISBN: 1597499579



Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Download Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers from rapidshare, mediafire, 4shared. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract m Search and find a lot of computer books in many category availabe for free download.

download

Violent Python Free


Violent Python computer books for free. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract m

Related education books


Metasploit: The Penetration Tester's Guide


"The best guide to the Metasploit Framework." -HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by secu

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)


The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; w

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide


Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS

No comments:

Post a Comment