Beginning Ethical Hacking with Python
Apress (Verlag)
978-1-4842-2540-0 (ISBN)
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
Discover the legal constraints of ethical hacking
Work with virtual machines and virtualization
Develop skills in Python 3
See the importance of networking in ethical hacking
Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.
Chapter - 1. Legal Side of Hacking.- Chapter - 2. Hacking Environment.- Chapter - 3. What Is VirtualBox?.- Chapter - 4. Install Kali Linux & Other OS in VBChapter - 5. Linux Terminals and Basic Functionalities.- Chapter 6 – Role of Python in Ethical Hacking.- Chapter 7 - Python environment.- Chapter 8 – General Syntaxes.- Chapter 9 – Variables, Objects and Values.-l Chapter 10 - ConditionalsChapter 11 – How Loops Make Your Life Easier.- Chapter 12 - Regular ExpressionsChapter 13 – Exceptions, Catching Errors.- Chapter 14 - Functions.- Chapter 15 - Classes.- Chapter 16 - String Methods.- Chapter 17 - File Input and Output.- Chapter 18 - Containers.- Chapter 19 – Database.- Chapter 20 - Module.- Chapter 21 – Debugging, UnitTest Module.- Chapter 22 - Socket and NetworkingChapter 23 – Importing Nmap Module.- Chapter 24 – Building an Nmap Network ScannerChapter 25 - Protect Your Anonymity on Internet.- Chapter 26 – Dark Web and TorChapter 27 - Proxy Chains.- Chapter 28 – VPN.- Chapter 29 - Mac Address.
Erscheinungsdatum | 03.01.2017 |
---|---|
Zusatzinfo | 22 Illustrations, color; XIX, 201 p. 22 illus. in color. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Programmiersprachen / -werkzeuge ► Python | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | beginnerguide • Encryption • ethicalhacking • Hacker / Hacking • Hacking • Python • python3 • Python (Programmiersprache); Spezielle Anwendungsbereiche • security |
ISBN-10 | 1-4842-2540-6 / 1484225406 |
ISBN-13 | 978-1-4842-2540-0 / 9781484225400 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich