Monday, 2 July 2012

Violent Python Download

Violent Python
Author: TJ O'Connor
Edition: 1
Binding: Kindle Edition
ISBN: B00ABY67JS



Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Download Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers from rapidshare, mediafire, 4shared. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network a Search and find a lot of computer books in many category availabe for free download.

download

Violent Python Free


Violent Python computer books for free.

- Demonstrates how to write Python scripts to automate large-scale network a

Related education books


Network Forensics: Tracking Hackers through Cyberspace


"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created

Metasploit: The Penetration Tester's Guide


"The best guide to the Metasploit Framework."
-HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is u

Hacking: The Art of Exploitation: The Art of Exploitation


Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation

Nmap 6: Network exploration and security auditing Cookbook


In DetailNmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced

No comments:

Post a Comment