Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
"Sinopsis" puede pertenecer a otra edición de este libro.
TJ O’Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency’s annual Cyber Defense Exercise and won the National Defense University’s first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.
TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.
TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 7,52 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 9,26 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.18. Nº de ref. del artículo: G1597499579I4N00
Cantidad disponible: 1 disponibles
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
Condición: Good. Used book that is in clean, average condition without any missing pages. Nº de ref. del artículo: 9239292-6
Cantidad disponible: 1 disponibles
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
Condición: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Nº de ref. del artículo: GRP98940456
Cantidad disponible: 1 disponibles
Librería: BookHolders, Towson, MD, Estados Unidos de America
Condición: Good. [ No Hassle 30 Day Returns ][ Ships Daily ] [ Underlining/Highlighting: NONE ] [ Writing: NONE ] [ Edition: first ] Publisher: Syngress Pub Date: 11/22/2012 Binding: Paperback Pages: 288 first edition. Nº de ref. del artículo: 6704217
Cantidad disponible: 1 disponibles
Librería: Speedyhen, London, Reino Unido
Condición: NEW. Nº de ref. del artículo: NW9781597499576
Cantidad disponible: 2 disponibles
Librería: SecondSale, Montgomery, IL, Estados Unidos de America
Condición: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00088482711
Cantidad disponible: 1 disponibles
Librería: SecondSale, Montgomery, IL, Estados Unidos de America
Condición: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00084517786
Cantidad disponible: 4 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9781597499576_new
Cantidad disponible: Más de 20 disponibles
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condición: New. 2012. 1st Edition. Paperback. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices. Num Pages: 290 pages, black & white illustrations. BIC Classification: UMW; UR. Category: (P) Professional & Vocational. Dimension: 235 x 193 x 15. Weight in Grams: 542. . . . . . Nº de ref. del artículo: V9781597499576
Cantidad disponible: 2 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 630. Nº de ref. del artículo: B9781597499576
Cantidad disponible: Más de 20 disponibles