Neu:
-14 % 38,99€38,99€
KOSTENFREIE Retouren
GRATIS Lieferung Donnerstag, 2. Oktober
Oder schnellste Lieferung Mittwoch, 1. Oktober. Bestellung innerhalb 10 Stdn. 7 Min.
Auf Lager
Versand
Amazon
Verkäufer
Amazon
Rückgaben
Retournierbar, wenn diese innerhalb von 14 Tagen nach dem Erhalt angefordert wird
Zahlung
Sichere Transaktion
Mit „Gebraucht – Gut“ sparen
19,99€19,99€
GRATIS Lieferung 2. - 4. Oktober
Versand durch: Sascha Becker Verkauft von: Sascha Becker
Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Dem Autor folgen
OK
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Taschenbuch – 8. November 2012
Kaufoptionen und Plus-Produkte
- Seitenzahl der Print-Ausgabe288 Seiten
- SpracheEnglisch
- HerausgeberSyngress
- Erscheinungstermin8. November 2012
- Abmessungen19.05 x 1.65 x 23.5 cm
- ISBN-101597499579
- ISBN-13978-1597499576
Kunden, die diesen Artikel angesehen haben, haben auch angesehen
Produktbeschreibungen
Pressestimmen
"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it." --Reference and Research Book News, August 2013
"A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title… The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be… useful tips and tricks will surely be acquired simply by working through the exercises." --The Ethical Hacker Network, February 2013
"Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm." --The Ethical Hacker Network, February 2013
"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth
"Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." --James Shewmaker, Security Analyst, Bluenotch Corporation
"The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." --Raphael Mudge, Creator of Armitage
Rezension
Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers
Über den Autor und weitere Mitwirkende
TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.
TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.
Produktinformation
- Herausgeber : Syngress
- Erscheinungstermin : 8. November 2012
- Auflage : 1.
- Sprache : Englisch
- Seitenzahl der Print-Ausgabe : 288 Seiten
- ISBN-10 : 1597499579
- ISBN-13 : 978-1597499576
- Abmessungen : 19.05 x 1.65 x 23.5 cm
- Amazon Bestseller-Rang: Nr. 1.324.559 in Bücher (Siehe Top 100 in Bücher)
- Nr. 1.590 in Computernetzwerke
- Nr. 2.153 in Script-Sprachen
- Nr. 4.114 in Programmiersprachen
- Kundenrezensionen:
Informationen zum Autor

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.
Kundenrezensionen
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern5 Sterne74%15%6%2%3%74%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern4 Sterne74%15%6%2%3%15%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern3 Sterne74%15%6%2%3%6%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern2 Sterne74%15%6%2%3%2%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern1 Stern74%15%6%2%3%3%
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.Spitzenrezensionen aus Deutschland
Es gab ein Problem beim Filtern der Rezensionen. Bitte lade die Seite neu.
- Bewertet in Deutschland am 27. Januar 2019Formatieren: TaschenbuchVerifizierter KaufIm Rahmen des Studiums unseres Sohnes mega hilfreich
-
Bewertet in Deutschland am 10. Oktober 2018Formatieren: TaschenbuchVerifizierter KaufIf you want to protect your computer or a network you need this kind of book
- Bewertet in Deutschland am 16. Oktober 2020Formatieren: KindleVerifizierter KaufDer Kindle reader für Windows 10 verändert wild die Zeilenumbrüche, was den Code unlesbar macht. Definitiv nicht zu empfehlen.
Spitzenrezensionen aus anderen Ländern
-
MisterBGBewertet in Frankreich am 28. Februar 20175,0 von 5 Sternen reçu hier et déj)à conquis
Formatieren: TaschenbuchVerifizierter KaufJ'ai reçu ce livre hier et m'en suis emparé de suite!
contenu qui monte rapidement en complexité (tant mieux) et, cela mérite d'être cité, le tout est clairement expliqué.
Je lis en pratiquant en même temps sur mon ordi pour mieux comprendre et c'est impeccable.
il y a même un site ou on peut récupérer directement les codes présentés dans le livre, ce qui est un plus pour celui qui ne souhaite pas tout retaper. Personnelement, je préfère retaper car j'apprends mieux en faisant par moi-même (car c'est en faisant des "bêtises" qu'on arrive plus facilement à les identifier et à les éviter par la suite alors que si on se contente de copier/coller le code... l'apprentissage n'est pas aussi bon ;) )
ce livre complète mes autres bouquins sur python "grey hat python", "black hat python". à mon avis ce livre est supérieur aux deux précédemment cités en terme de pédagogie tout du moins puisqu'ils n'ont pas non plus la même finalité.
avoir des connaissances (et si possible un peu plus) en Python est selon moi un prérequis sinon, vous risquez de galérer pour aller plus loin que le chapître 1.
-
るろうにプログラマBewertet in Japan am 7. Oktober 20145,0 von 5 Sternen 俗に言う、ハッキングの教科書
Formatieren: TaschenbuchVerifizierter Kauf所謂世間一般のハッキングの本です。実際にPythonでスクリプトを作成しつつ ネットワーク侵入の手口や トラフィック解析などを取り上げます。
各章の前半に語られるストーリーも面白く 英語も平易な書き方なので 何を言ってるか分からないという事はないと思います。
日本にはこういうある意味コンピュータサイエンスを悪用?する手法を解説したものがないため、そういった手口を学ぶにはうってつけだと思います
-
Amazon CustomerBewertet in Kanada am 2. November 20165,0 von 5 Sternen great book for starting out in python
Formatieren: TaschenbuchVerifizierter Kaufgreat book for starting out in python. it gives great examples and information about past use of the scripts. a must for any pen tester
-
Professor dot bizBewertet in den USA am9. Oktober 20145,0 von 5 Sternen Great Intro Especially to Forensics IF you have the libraries
Formatieren: TaschenbuchVerifizierter KaufMy hosting provider, and my own servers, have py, but that doesn't mean you have access to the libraries mentioned in this fine little book! It attempts to be both an introduction to Python and an intro to some sploits and some forensics. It does a good job if you're into either, and just now starting to learn some of your own Python coding.
The "hot book" on Python Forensics right now is Hosmer-- Python Forensics: A workbench for inventing and sharing digital forensic technology-- much more detailed, more expensive, more recent, and a much tighter focus on forensics than the broader brush of this book, which includes some pen development. Elesevier always gives their text web resources in the format elsevierdirect dot com forward slash companion then the isbn. This book's code is not as error filled as some earlier reviews said, so I'm guessing that it has been updated and corrected. Again, you'll need library access, and the code isn't as well annotated as Hosmer or Ligh's fine and classic Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, but remember it is pure Python, which will help both introduce and fill in some blanks in both Ligh and Hosmer.
By the way, Ligh also has a new, wonderful book out on forensics: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, and of course Ligh uses Python in all his books, blogs and articles as the "behind the scenes" create your own resource. I'm also a developer and contribute to zsand dot com's sandboxes, and one thing this book is missing that you'll find in both Ligh and Hosmer, are COMBINATIONS of sploit software that let you customize or see things like little python windows adding elements to the bigger API. An example would be embedding any PE (dll/exe etc.) in a "harmless" looking extension like .pdf, a network update or even a non-kernel/root looking extension like a screen tip or update.
Speaking of, since the authors of this book are all military, the upside is seeing how that world thinks (worked in it for some years), but the downside is their "courtesy." For example, they will say that the problem with a Google sploit is that it "requires a developer id which compromises anonymity" but completely ignores how easy it is to buy, hack, borrow or get those credentials, ids and codes anonymously online. This doesn't have to be black, it can even be for your own honeypot or a follow up on an attack where you don't want your developer id revealed even if you do have you own!
Highly recommended for beginners and those with access to py libraries. The caveat is that the freeware and GNU libraries out there are not enough, although they are much better than they were when this text was written, and Hosmer also shows you how to go direct instead of relying on libraries when you can't get them.
-
Rodrigo VianaBewertet in Brasilien am 17. Dezember 20241,0 von 5 Sternen Desatualizado
Formatieren: TaschenbuchVerifizierter KaufComprei o livro sem me atentar a versão do Python, acabei devolvendo. Acredito que deveria atualizar o livro e tirar esse de circulação.
