Books+ Search Results

Beginning Ethical Hacking with Python

Title
Beginning Ethical Hacking with Python [electronic resource] / by Sanjib Sinha.
ISBN
9781484225417
Publication
Berkeley, CA : Apress : Imprint: Apress, 2017.
Physical Description
XIX, 201 p. 22 illus. in color : online resource.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3 See the importance of networking in ethical hacking Gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more.
Variant and related titles
Springer ebooks.
Other formats
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
January 05, 2017
Contents
Chapter - 1. Legal Side of Hacking
Chapter - 2. Hacking Environment
Chapter - 3. What Is VirtualBox?
Chapter - 4. Install Kali Linux & Other OS in VB Chapter - 5. Linux Terminals and Basic Functionalities
Chapter 6 – Role of Python in Ethical Hacking
Chapter 7 - Python environment
Chapter 8 – General Syntaxes
Chapter 9 – Variables, Objects and Values.-l Chapter 10 - Conditionals Chapter 11 – How Loops Make Your Life Easier
Chapter 12 - Regular Expressions Chapter 13 – Exceptions, Catching Errors
Chapter 14 - Functions
Chapter 15 - Classes
Chapter 16 - String Methods
Chapter 17 - File Input and Output
Chapter 18 - Containers
Chapter 19 – Database
Chapter 20 - Module
Chapter 21 – Debugging, UnitTest Module
Chapter 22 - Socket and Networking Chapter 23 – Importing Nmap Module
Chapter 24 – Building an Nmap Network Scanner Chapter 25 - Protect Your Anonymity on Internet
Chapter 26 – Dark Web and Tor Chapter 27 - Proxy Chains
Chapter 28 – VPN
Chapter 29 - Mac Address.
Also listed under
SpringerLink (Online service)
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?