Muutke küpsiste eelistusi

Beginning Ethical Hacking with Python 1st ed. [Pehme köide]

  • Formaat: Paperback / softback, 201 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 22 Illustrations, color; XIX, 201 p. 22 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 27-Dec-2016
  • Kirjastus: APress
  • ISBN-10: 1484225406
  • ISBN-13: 9781484225400
Teised raamatud teemal:
  • Pehme köide
  • Hind: 44,06 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 51,84 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 201 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 22 Illustrations, color; XIX, 201 p. 22 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 27-Dec-2016
  • Kirjastus: APress
  • ISBN-10: 1484225406
  • ISBN-13: 9781484225400
Teised raamatud teemal:

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.


What You Will Learn

  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For

Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 


Arvustused

This book has an interesting premiseit offers to teach one how to accomplish ethical hacking tasks using Python. Under this guise, the book gives a good introduction to using the Python programming languages general features and spends the bulk of its pages teaching Python . This book falls into the introductory category for the Python programming language; therefore, it is well suited for individuals new to the language. Summing Up: Recommended. All readers. (F. H. Wild III, Choice, Vol. 54 (11), July, 2017)

About the Author xi
About the Technical Reviewer xiii
Acknowledgments xv
Prologue -- Hacker's Goal xvii
Part I
1(34)
Chapter 1 Legal Side of Hacking
3(2)
Chapter 2 Hacking Environment
5(4)
Ethical Hacking and Networking
6(1)
What Does Network Mean?
6(2)
Summary
8(1)
Chapter 3 Installing Virtual Box
9(4)
Chapter 4 Installing Kali Linux and Other Operating Systems on VB
13(8)
Chapter 5 Linux Terminal, Basic Commands
21(14)
Summary
33(2)
Part II
35(134)
Chapter 6 Python 3 and Ethical Hacking
37(2)
Chapter 7 Python Environment
39(4)
Chapter 8 General Syntaxes
43(6)
Create the main() function
43(1)
Indentation and White Space
44(2)
Commenting
46(1)
Assigning Values
47(2)
Chapter 9 Variables, Objects and Values
49(18)
Using Numbers
52(2)
String
54(2)
What is Type and ID
56(3)
Logical Values
59(1)
Tuples And Lists
60(3)
Dictionary
63(1)
Object
64(3)
Chapter 10 Conditionals
67(2)
Chapter 11 Loops
69(6)
While Loops
69(2)
For Loops
71(4)
Chapter 12 Regular Expressions
75(6)
Using "re" Module
75(2)
Reusing With Regular Expressions
77(1)
Searching with Regular Expressions
78(3)
Chapter 13 Exceptions, Catching Errors
81(4)
Chapter 14 Functions
85(12)
Return Values
90(1)
Generate Functions
90(3)
Lists of Arguments
93(1)
Named Arguments
94(3)
Chapter 15 Classes
97(24)
Object-Oriented Methodology
97(1)
The Foundation of Object Orientation
97(1)
Understanding Classes and Objects
98(4)
Write Your Own Game, "Good Vs Bad"
102(4)
Primary Class and Object
106(5)
Accessing Object Data
111(3)
Polymorphism
114(2)
Using Generators
116(1)
Inheritance
117(2)
Decorator
119(2)
Chapter 16 String Methods
121(6)
Chapter 17 File Input And Output
127(2)
Chapter 18 Containers
129(8)
Operating on Tuple and List Object
130(5)
Operating on Dictionary Object
135(2)
Chapter 19 Database
137(12)
Let us start with SQLite3
137(1)
MySQL for Big Project
138(11)
Chapter 20 Module
149(4)
Chapter 21 Debugging, Unittest Module
153(4)
Chapter 22 Socket and Networking
157(2)
Chapter 23 Importing Nmap Module
159(6)
Chapter 24 Building an Nmap Network Scanner
165(4)
Part III
169(26)
Chapter 25 Protect Anonymity on the Internet
171(2)
Chapter 26 Dark Web and Tor
173(6)
Hidden Wikipedia
174(5)
Chapter 27 Proxy Chains
179(6)
Chapter 28 Virtual Private Network or VPN
185(6)
Chapter 29 MAC Address
191(4)
Epilogue---What Next 195(2)
Index 197
Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.