Ccomputer Books

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 7 November 2013

Violent Python

Posted on 03:39 by Unknown
Violent Python
Author: TJ O'Connor
Edition: 1
Binding: Paperback
ISBN: 1597499579
Publisher: Syngress

download


Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers



Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation.
Violent Python : Paperback : Syngress Media,US : 9781597499576 : 1597499579 : 17 Dec 2012 : Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract m

Metasploit: The Penetration Tester's Guide


"The best guide to the Metasploit Framework." -HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relativ

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)


The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and in

Network Forensics: Tracking Hackers through Cyberspace


"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivi

Hacking: The Art of Exploitation, 2nd Edition


Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hack

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in computer | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • A Computer Scientist's Guide to Cell Biology
    Author: William W. Cohen Edition: 2007 Binding: Paperback ISBN: 038748275X Publisher: Springer A Computer Scientist's Guide to Cell Biol...
  • A Geek in Japan
    Author: Hector Garcia Edition: Original Binding: Paperback ISBN: 4805311290 Publisher: Tuttle Publishing A Geek in Japan: Discovering the La...
  • A Discipline of Programming
    Author: Edsger W. Dijkstra Edition: Binding: Paperback ISBN: 013215871X Publisher: Prentice Hall, Inc. A Discipline of Programming Author Ed...
  • A Networker's Journal
    Author: Cisco Press Edition: 1 Binding: Hardcover ISBN: 1587131587 Publisher: Cisco Press A Networker's Journal Cisco-branded journal fo...
  • A Tale of Two Transformations
    Author: Michael K. Levine Edition: 1 Binding: Hardcover ISBN: 1439879753 Publisher: Productivity Press A Tale of Two Transformations: Bringi...
  • Computer Networking First-Step
    Author: Wendell Odom Edition: Binding: Paperback ISBN: 1587201011 Publisher: Cisco Press Computer Networking First-Step Your first step into...
  • Information Systems
    Author: Cheng K Hsu Edition: Binding: Hardcover ISBN: 9814383511 Publisher: World Scientific Publishing Company Information Systems: The Con...
  • Computer and Information Security Handbook
    Author: John R. Vacca Edition: 1 Binding: Hardcover ISBN: 0123743540 Publisher: Morgan Kaufmann Computer and Information Security Handbook (...
  • Computer Algebra Recipes
    Author: Richard H. Enns Edition: 2007 Binding: Paperback ISBN: 0387257683 Publisher: Springer Computer Algebra Recipes: An Advanced Guide to...
  • Data Modeling Fundamentals
    Author: Paulraj Ponniah Edition: 1 Binding: Hardcover ISBN: 0471790494 Publisher: Wiley-Interscience Data Modeling Fundamentals: A Practical...

Categories

  • computer

Blog Archive

  • ▼  2013 (500)
    • ►  December (3)
    • ▼  November (16)
      • Elder Scrolls V: Skyrim Revised & Expanded
      • Data Points
      • Design Patterns
      • C Programming Language
      • How to Create a Mind
      • The Personal Internet Address & Password Log Book
      • iPad For Dummies
      • Programming in Objective-C (5th Edition)
      • Pro C# 5.0 and the .NET 4.5 Framework
      • Influencer
      • The Adobe Photoshop CS6 Book for Digital Photograp...
      • Programming Arduino Getting Started with Sketches
      • The Pragmatic Programmer
      • Violent Python
      • Lean UX
      • Learning From Data
    • ►  October (18)
    • ►  September (15)
    • ►  August (16)
    • ►  July (16)
    • ►  June (16)
    • ►  May (145)
    • ►  April (151)
    • ►  March (104)
Powered by Blogger.

About Me

Unknown
View my complete profile