Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Nonfiction, Computers, Application Software, Computer Security, General Computing, Programming
Cover of the book Violent Python by TJ O'Connor, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: TJ O'Connor ISBN: 9781597499644
Publisher: Elsevier Science Publication: December 28, 2012
Imprint: Syngress Language: English
Author: TJ O'Connor
ISBN: 9781597499644
Publisher: Elsevier Science
Publication: December 28, 2012
Imprint: Syngress
Language: English

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

More books from Elsevier Science

Cover of the book Optical, Electric and Magnetic Properties of Molecules by TJ O'Connor
Cover of the book Nanotechnology Environmental Health and Safety by TJ O'Connor
Cover of the book Handbook of MRI Pulse Sequences by TJ O'Connor
Cover of the book Caenorhabditis elegans: Cell Biology and Physiology by TJ O'Connor
Cover of the book Neurophotonics and Biomedical Spectroscopy by TJ O'Connor
Cover of the book Advances in Applied Microbiology by TJ O'Connor
Cover of the book The Real Citrix CCA Exam Preparation Kit by TJ O'Connor
Cover of the book Particle Formation with Supercritical Fluids by TJ O'Connor
Cover of the book Structural Genomics, Part C by TJ O'Connor
Cover of the book The Mendip Caves by TJ O'Connor
Cover of the book High Temperature Oxidation and Corrosion of Metals by TJ O'Connor
Cover of the book Microbiorobotics by TJ O'Connor
Cover of the book Security and Loss Prevention by TJ O'Connor
Cover of the book Electrocorrosion and Protection of Metals by TJ O'Connor
Cover of the book Darwin’s Pangenesis and Its Rediscovery Part B by TJ O'Connor
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy