Author: TJ O'Connor
Edition: 1
Binding: Paperback
ISBN: 1597499579
Edition: 1
Binding: Paperback
ISBN: 1597499579
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Download Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers from rapidshare, mediafire, 4shared. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract m Search and find a lot of computer books in many category availabe for free download.
Violent Python Free
Violent Python computer books for free. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract m
Related education books
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." -HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by secu
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; w
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS
No comments:
Post a Comment