Violent Python
22
%
977 Kč 1 250 Kč
Odesíláme do 1 až 2 týdnů
Sleva až 70% u třetiny knih
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.
Autor: | O'Connor, TJ |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9781597499576 |
Rok vydání: | 2012 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 288 |
Mohlo by se vám také líbit..
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
CISSP Study Guide
Conrad, Eric
-
Security Risk Management
Evans V., DooleyJ., Wheeler A.
-
SQL Injection Attacks and Defense
Clarke-Salt, Justin
-
Practical Deployment of Cisco Identi...
Richter, Mandy
-
Threat Forecasting
Pirc, John (Director, Security Solutions, Forsythe Technology and Co-Founder & Advisor, Bricata, LLC); DeSanto, David (D
-
Industrial Network Security
Knapp, Eric D. (Director of Critical Infrastructure Markets for NitroSecurity); Samani, Raj (VP, CTO for McAfee EMEA; CL
-
Automating Open Source Intelligence
Robert A. Slayton
-
Logging and Log Management
Schmidt, Kevin; Chuvakin, Anton
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Information Security Risk Assessment...
Talabis, Mark
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
The Basics of Digital Forensics
Sammons, John
-
Breaking into Information Security
More, Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIAC-GCIH, GIAC-GSLC)); Stieber, Anthony J. (has over
-
Practical Lock Picking
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
A Guide to Kernel Exploitation
Perla, Enrico