skip to content
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers Preview this item
ClosePreview this item
Checking...

Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers

Author: T J O'Connor
Publisher: Waltham, MA : Syngress, ©2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
O'Connor, T. J.
Violent Python
(DLC) 2012030814
(OCoLC)813220708
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: T J O'Connor
ISBN: 9781597499644 1597499641
OCLC Number: 819636703
Description: 1 online resource (xxv, 262 p.)
Responsibility: T.J. O'Connor.

Abstract:

Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/819636703> # Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "819636703" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1164854177#Place/waltham_ma> ; # Waltham, MA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=420'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}Img100.jpg'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=50'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=610'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=410'" ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
    schema:about <http://id.worldcat.org/fast/872068> ; # Computer crimes--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_c> ; # COMPUTERS / Programming Languages / C#
    schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computer_networks_security_measures> ; # Computer networks / Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_java> ; # COMPUTERS / Programming Languages / Java
    schema:about <http://dewey.info/class/005.133/e23/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh2008117723> ; # Computer crimes--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_pascal> ; # COMPUTERS / Programming Languages / Pascal
    schema:about <http://id.loc.gov/authorities/subjects/sh2010118631> ; # Wireless communication systems--Security measures
    schema:about <http://id.worldcat.org/fast/1084736> ; # Python (Computer program language)
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.worldcat.org/fast/1176222> ; # Wireless communication systems--Security measures
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2013" ;
    schema:creator <http://viaf.org/viaf/271553822> ; # T. J. O'Connor
    schema:datePublished "2013" ;
    schema:description "Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus." ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1164854177> ;
    schema:genre "Electronic books" ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/813220708> ;
    schema:name "Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers" ;
    schema:numberOfPages "262" ;
    schema:productID "819636703" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/819636703#PublicationEvent/waltham_ma_syngress_c2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1164854177#Agent/syngress> ; # Syngress
    schema:url <http://proquest.tech.safaribooksonline.de/9781597499576> ;
    schema:url <https://samples.overdrive.com/?crid=8D31DAD4-A741-41BF-9A3D-4D6D740B9C22&.epub-sample.overdrive.com> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597499576> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781597499576> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=410" ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=51017> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=610" ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}Img100.jpg" ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=420" ;
    schema:url <http://lib.myilibrary.com?id=412058> ;
    schema:url <http://resources.library.brandeis.edu/login?url=http://library.books24x7.com/library.asp?%5eB&bookid=51017> ;
    schema:url <http://site.ebrary.com/id/10623061> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=486623> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={8D31DAD4-A741-41BF-9A3D-4D6D740B9C22}&Format=50" ;
    schema:workExample <http://worldcat.org/isbn/9781597499644> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/819636703> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computer_networks_security_measures> # Computer networks / Security measures
    a schema:Intangible ;
    schema:name "Computer networks / Security measures" ;
    .

<http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_c> # COMPUTERS / Programming Languages / C#
    a schema:Intangible ;
    schema:name "COMPUTERS / Programming Languages / C#" ;
    .

<http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_java> # COMPUTERS / Programming Languages / Java
    a schema:Intangible ;
    schema:name "COMPUTERS / Programming Languages / Java" ;
    .

<http://experiment.worldcat.org/entity/work/data/1164854177#Topic/computers_programming_languages_pascal> # COMPUTERS / Programming Languages / Pascal
    a schema:Intangible ;
    schema:name "COMPUTERS / Programming Languages / Pascal" ;
    .

<http://id.loc.gov/authorities/subjects/sh2008117723> # Computer crimes--Prevention
    a schema:Intangible ;
    schema:name "Computer crimes--Prevention" ;
    .

<http://id.loc.gov/authorities/subjects/sh2010118631> # Wireless communication systems--Security measures
    a schema:Intangible ;
    schema:name "Wireless communication systems--Security measures" ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation" ;
    .

<http://id.worldcat.org/fast/1084736> # Python (Computer program language)
    a schema:Intangible ;
    schema:name "Python (Computer program language)" ;
    .

<http://id.worldcat.org/fast/1176222> # Wireless communication systems--Security measures
    a schema:Intangible ;
    schema:name "Wireless communication systems--Security measures" ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation" ;
    .

<http://id.worldcat.org/fast/872068> # Computer crimes--Prevention
    a schema:Intangible ;
    schema:name "Computer crimes--Prevention" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security" ;
    .

<http://viaf.org/viaf/271553822> # T. J. O'Connor
    a schema:Person ;
    schema:familyName "O'Connor" ;
    schema:givenName "T. J." ;
    schema:name "T. J. O'Connor" ;
    .

<http://worldcat.org/isbn/9781597499644>
    a schema:ProductModel ;
    schema:isbn "1597499641" ;
    schema:isbn "9781597499644" ;
    .

<http://www.worldcat.org/oclc/813220708>
    a schema:CreativeWork ;
    rdfs:label "Violent Python" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/819636703> ; # Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
    .

<http://www.worldcat.org/title/-/oclc/819636703>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/819636703> ; # Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers
    schema:dateModified "2015-04-02" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.