Facebook Twitter Pinterest <Einbetten>
EUR 40,80 + GRATIS Lieferung innerhalb Deutschlands
Nur noch 6 auf Lager
Verkauf und Versand durch averdo24. Für weitere Informationen, Impressum, AGB und Widerrufsrecht klicken Sie bitte auf den Verkäufernamen.
EUR 40,80 + GRATIS Lieferung innerhalb Deutschlands

Lieferort:
Um Adressen zu sehen, bitte
Oder
Bitte tragen Sie eine deutsche PLZ ein.
Oder
Andere Verkäufer auf Amazon
In den Einkaufswagen
EUR 37,76
+ EUR 3,00 Versandkosten
Verkauft von: moviemars-de
In den Einkaufswagen
EUR 37,77
+ EUR 3,00 Versandkosten
Verkauft von: SuperBookDealsDE
In den Einkaufswagen
EUR 41,68
Kostenlose Lieferung. Details
Verkauft von: Amazon
Möchten Sie verkaufen? Bei Amazon verkaufen
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 3 Bilder anzeigen

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Englisch) Taschenbuch – 8. November 2012


Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
Taschenbuch
EUR 40,80
EUR 37,76 EUR 41,99
30 neu ab EUR 37,76 5 gebraucht ab EUR 41,99
click to open popover

Wird oft zusammen gekauft

  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • +
  • Black Hat Python: Python Programming for Hackers and Pentesters
  • +
  • Rtfm: Red Team Field Manual
Gesamtpreis: EUR 67,13
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Pressestimmen

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it." --Reference and Research Book News, August 2013 "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title... The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be... useful tips and tricks will surely be acquired simply by working through the exercises." --The Ethical Hacker Network, February 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm." --The Ethical Hacker Network, February 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." --James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." --Raphael Mudge, Creator of Armitage

Über den Autor und weitere Mitwirkende

TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition. TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians. TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.



Kundenrezensionen

Noch keine Kundenrezensionen vorhanden.
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen auf Amazon.com

Amazon.com: 4,3 von 5 Sternen 102 Rezensionen
5,0 von 5 SternenGreat for security enthusiasts
am 2. Januar 2018 - Veröffentlicht auf Amazon.com
Verifizierter Kauf
4,0 von 5 SternenWould highly recommend knowing some programming prior to reading this book so ...
am 7. Januar 2018 - Veröffentlicht auf Amazon.com
Verifizierter Kauf
4,0 von 5 SternenDefinitely recommend this for anyone looking to get more comfortable coding ...
am 26. Januar 2018 - Veröffentlicht auf Amazon.com
Verifizierter Kauf
Eine Person fand diese Informationen hilfreich.
4,0 von 5 Sternenwell done
am 7. August 2017 - Veröffentlicht auf Amazon.com
Verifizierter Kauf
2 Personen fanden diese Informationen hilfreich.
4,0 von 5 SternenDefending with Python
am 31. Januar 2013 - Veröffentlicht auf Amazon.com
Verifizierter Kauf
Möchten Sie weitere Produkte entdecken? Weitere Informationen finden Sie auf dieser Seite: python programming

Wo ist meine Bestellung?

Versand & Rücknahme

Brauchen Sie Hilfe?