Python for secret agents :: analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents /
If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book. |
Beschreibung: | 1 online resource (216 pages) : illustrations |
ISBN: | 9781783980437 1783980435 1783980427 9781783980420 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn891381417 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 140904t20142014enka jo 001 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d UMI |d N$T |d DEBBG |d DEBSZ |d EBLCP |d IDEBK |d S4S |d COO |d YDXCP |d OCLCQ |d AGLDB |d ICA |d MERUC |d OCLCQ |d REB |d D6H |d OCLCF |d VTS |d CEF |d OCLCQ |d UKMGB |d WYU |d STF |d UAB |d AU@ |d M8D |d UKAHL |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO | ||
015 | |a GBB747319 |2 bnb | ||
016 | 7 | |a 018006786 |2 Uk | |
019 | |a 889675883 |a 891786422 |a 907279810 |a 1259084602 | ||
020 | |a 9781783980437 |q (electronic bk.) | ||
020 | |a 1783980435 |q (electronic bk.) | ||
020 | |a 1783980427 | ||
020 | |a 9781783980420 | ||
020 | |z 9781783980420 | ||
035 | |a (OCoLC)891381417 |z (OCoLC)889675883 |z (OCoLC)891786422 |z (OCoLC)907279810 |z (OCoLC)1259084602 | ||
037 | |a CL0500000484 |b Safari Books Online | ||
050 | 4 | |a TK5105.8883 |b .L68 2014eb | |
072 | 7 | |a COM |x 000000 |2 bisacsh | |
082 | 7 | |a 006.78 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Lott, Steven F., |e author. | |
245 | 1 | 0 | |a Python for secret agents : |b analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / |c Steven F. Lott ; cover image by Jarek Blaminsky. |
264 | 1 | |a Birmingham, England : |b Packt Publishing Ltd, |c 2014. | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (216 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community Experience Distilled | |
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed September 4, 2014). | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Our Espionage Toolkit; Getting the tools of the trade -- Python 3.3; Windows secrets; Mac OS X secrets; Getting more tools -- a text editor; Getting other developer tools; Getting a tool to get more Python components; Confirming our tools; How do we stop?; Using the help() system; Mac OS and GNU/Linux secrets; Windows secrets; Using the help mode; Background briefing -- math and numbers; The usual culprits; The ivory tower of numbers; Integer numbers; Rational numbers. | |
505 | 8 | |a Floating-point numbersDecimal numbers; Complex numbers; Outside the numbers; Assigning values to variables; Writing scripts and seeing output; Gathering user input; Handling exceptions; Looping and trying again; Handling text and strings; Converting between numbers and strings; Parsing strings; Organizing our software; Working with files and folders; Creating a file; Reading a file; Defining more complex logical conditions; Solving problems -- recovering a lost password; Reading a word corpus; Reading a ZIP archive; Using brute-force search; Summary; Chapter 2: Acquiring Intelligence Data. | |
505 | 8 | |a Accessing data from the InternetBackground briefing -- the TCP/IP protocols; Using http.client for HTTP GET; Changing our client information; Using FTP in Python; Downloading a file via FTP; Using our FTP get() function; Using urllib for HTTP, FTP, or file access; Using urllib for FTP access; Using a REST API in Python; Getting simple REST data; Using more complex RESTful queries; Saving our data via JSON; Organizing collections of data; Using a Python list; Using list index operations; Using a Python tuple; Using generator expressions with list-of-tuples; Using a Python dictionary mapping. | |
505 | 8 | |a Using the dictionary access methodsTransforming sequences with generator functions; Using the defaultdict and counter mappings; Using a Python set; Using the for statement with a collection; Using Python operators on collections; Solving problems -- currency conversion rates; Summary; Chapter 3: Encoding Secret Messages with Steganography; Background briefing -- handling file formats; Working with the OS filesystem; glob; os; Processing simple text files; Working with ZIP files; Working with JSON files; Working with CSV files; JPEG and PNG graphics -- pixels and metadata. | |
505 | 8 | |a Using the Pillow libraryAdding the required supporting libraries; GNU/Linux secrets; Mac OS X secrets; Windows secrets; Installing and confirming Pillow; Decoding and encoding image data; Manipulating images -- resizing and thumbnails; Manipulating images -- cropping; Manipulating images -- enhancing; Manipulating images -- filtering; Manipulating images -- ImageOps; Some approaches to steganography; Getting the red-channel data; Extracting bytes from Unicode characters; Manipulating bits and bytes; Assembling the bits; Encoding the message; Decoding a message; Detecting and preventing tampering. | |
520 | |a If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book. | ||
546 | |a English. | ||
650 | 0 | |a Web sites |x Authoring programs. |0 http://id.loc.gov/authorities/subjects/sh98000036 | |
650 | 0 | |a Web site development |x Computer software. | |
650 | 0 | |a Python (Computer program language) |v Juvenile literature. | |
650 | 6 | |a Sites Web |x Systèmes-auteur. | |
650 | 6 | |a Python (Langage de programmation) |v Ouvrages pour la jeunesse. | |
650 | 7 | |a COMPUTERS |x General. |2 bisacsh | |
650 | 7 | |a Python (Computer program language) |2 fast | |
650 | 7 | |a Web sites |x Authoring programs |2 fast | |
655 | 7 | |a Juvenile works |2 fast | |
700 | 1 | |a Blaminsky, Jarek, |e cover designer. | |
776 | 0 | 8 | |i Print version: |a Lott, Steven F. |t Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents. |d Birmingham, England : Packt Publishing Ltd, ©2014 |h v, 197 pages |k Community experience distilled. |z 9781783980420 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=836621 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH27085961 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1774323 | ||
938 | |a ebrary |b EBRY |n ebr10921224 | ||
938 | |a EBSCOhost |b EBSC |n 836621 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29662594 | ||
938 | |a YBP Library Services |b YANK |n 12055187 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn891381417 |
---|---|
_version_ | 1816882287666528256 |
adam_text | |
any_adam_object | |
author | Lott, Steven F. |
author2 | Blaminsky, Jarek |
author2_role | cov |
author2_variant | j b jb |
author_facet | Lott, Steven F. Blaminsky, Jarek |
author_role | aut |
author_sort | Lott, Steven F. |
author_variant | s f l sf sfl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8883 .L68 2014eb |
callnumber-search | TK5105.8883 .L68 2014eb |
callnumber-sort | TK 45105.8883 L68 42014EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Our Espionage Toolkit; Getting the tools of the trade -- Python 3.3; Windows secrets; Mac OS X secrets; Getting more tools -- a text editor; Getting other developer tools; Getting a tool to get more Python components; Confirming our tools; How do we stop?; Using the help() system; Mac OS and GNU/Linux secrets; Windows secrets; Using the help mode; Background briefing -- math and numbers; The usual culprits; The ivory tower of numbers; Integer numbers; Rational numbers. Floating-point numbersDecimal numbers; Complex numbers; Outside the numbers; Assigning values to variables; Writing scripts and seeing output; Gathering user input; Handling exceptions; Looping and trying again; Handling text and strings; Converting between numbers and strings; Parsing strings; Organizing our software; Working with files and folders; Creating a file; Reading a file; Defining more complex logical conditions; Solving problems -- recovering a lost password; Reading a word corpus; Reading a ZIP archive; Using brute-force search; Summary; Chapter 2: Acquiring Intelligence Data. Accessing data from the InternetBackground briefing -- the TCP/IP protocols; Using http.client for HTTP GET; Changing our client information; Using FTP in Python; Downloading a file via FTP; Using our FTP get() function; Using urllib for HTTP, FTP, or file access; Using urllib for FTP access; Using a REST API in Python; Getting simple REST data; Using more complex RESTful queries; Saving our data via JSON; Organizing collections of data; Using a Python list; Using list index operations; Using a Python tuple; Using generator expressions with list-of-tuples; Using a Python dictionary mapping. Using the dictionary access methodsTransforming sequences with generator functions; Using the defaultdict and counter mappings; Using a Python set; Using the for statement with a collection; Using Python operators on collections; Solving problems -- currency conversion rates; Summary; Chapter 3: Encoding Secret Messages with Steganography; Background briefing -- handling file formats; Working with the OS filesystem; glob; os; Processing simple text files; Working with ZIP files; Working with JSON files; Working with CSV files; JPEG and PNG graphics -- pixels and metadata. Using the Pillow libraryAdding the required supporting libraries; GNU/Linux secrets; Mac OS X secrets; Windows secrets; Installing and confirming Pillow; Decoding and encoding image data; Manipulating images -- resizing and thumbnails; Manipulating images -- cropping; Manipulating images -- enhancing; Manipulating images -- filtering; Manipulating images -- ImageOps; Some approaches to steganography; Getting the red-channel data; Extracting bytes from Unicode characters; Manipulating bits and bytes; Assembling the bits; Encoding the message; Decoding a message; Detecting and preventing tampering. |
ctrlnum | (OCoLC)891381417 |
dewey-full | 006.78 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.78 |
dewey-search | 006.78 |
dewey-sort | 16.78 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06524cam a2200745 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn891381417</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">140904t20142014enka jo 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">DEBBG</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">S4S</subfield><subfield code="d">COO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">REB</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKMGB</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">UAB</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB747319</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018006786</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">889675883</subfield><subfield code="a">891786422</subfield><subfield code="a">907279810</subfield><subfield code="a">1259084602</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783980437</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783980435</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783980427</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783980420</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781783980420</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891381417</subfield><subfield code="z">(OCoLC)889675883</subfield><subfield code="z">(OCoLC)891786422</subfield><subfield code="z">(OCoLC)907279810</subfield><subfield code="z">(OCoLC)1259084602</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000484</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8883</subfield><subfield code="b">.L68 2014eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.78</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lott, Steven F.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Python for secret agents :</subfield><subfield code="b">analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents /</subfield><subfield code="c">Steven F. Lott ; cover image by Jarek Blaminsky.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, England :</subfield><subfield code="b">Packt Publishing Ltd,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (216 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community Experience Distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed September 4, 2014).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Our Espionage Toolkit; Getting the tools of the trade -- Python 3.3; Windows secrets; Mac OS X secrets; Getting more tools -- a text editor; Getting other developer tools; Getting a tool to get more Python components; Confirming our tools; How do we stop?; Using the help() system; Mac OS and GNU/Linux secrets; Windows secrets; Using the help mode; Background briefing -- math and numbers; The usual culprits; The ivory tower of numbers; Integer numbers; Rational numbers.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Floating-point numbersDecimal numbers; Complex numbers; Outside the numbers; Assigning values to variables; Writing scripts and seeing output; Gathering user input; Handling exceptions; Looping and trying again; Handling text and strings; Converting between numbers and strings; Parsing strings; Organizing our software; Working with files and folders; Creating a file; Reading a file; Defining more complex logical conditions; Solving problems -- recovering a lost password; Reading a word corpus; Reading a ZIP archive; Using brute-force search; Summary; Chapter 2: Acquiring Intelligence Data.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Accessing data from the InternetBackground briefing -- the TCP/IP protocols; Using http.client for HTTP GET; Changing our client information; Using FTP in Python; Downloading a file via FTP; Using our FTP get() function; Using urllib for HTTP, FTP, or file access; Using urllib for FTP access; Using a REST API in Python; Getting simple REST data; Using more complex RESTful queries; Saving our data via JSON; Organizing collections of data; Using a Python list; Using list index operations; Using a Python tuple; Using generator expressions with list-of-tuples; Using a Python dictionary mapping.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Using the dictionary access methodsTransforming sequences with generator functions; Using the defaultdict and counter mappings; Using a Python set; Using the for statement with a collection; Using Python operators on collections; Solving problems -- currency conversion rates; Summary; Chapter 3: Encoding Secret Messages with Steganography; Background briefing -- handling file formats; Working with the OS filesystem; glob; os; Processing simple text files; Working with ZIP files; Working with JSON files; Working with CSV files; JPEG and PNG graphics -- pixels and metadata.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Using the Pillow libraryAdding the required supporting libraries; GNU/Linux secrets; Mac OS X secrets; Windows secrets; Installing and confirming Pillow; Decoding and encoding image data; Manipulating images -- resizing and thumbnails; Manipulating images -- cropping; Manipulating images -- enhancing; Manipulating images -- filtering; Manipulating images -- ImageOps; Some approaches to steganography; Getting the red-channel data; Extracting bytes from Unicode characters; Manipulating bits and bytes; Assembling the bits; Encoding the message; Decoding a message; Detecting and preventing tampering.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web sites</subfield><subfield code="x">Authoring programs.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh98000036</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web site development</subfield><subfield code="x">Computer software.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield><subfield code="v">Juvenile literature.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sites Web</subfield><subfield code="x">Systèmes-auteur.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Python (Langage de programmation)</subfield><subfield code="v">Ouvrages pour la jeunesse.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Python (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web sites</subfield><subfield code="x">Authoring programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Juvenile works</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Blaminsky, Jarek,</subfield><subfield code="e">cover designer.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Lott, Steven F.</subfield><subfield code="t">Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents.</subfield><subfield code="d">Birmingham, England : Packt Publishing Ltd, ©2014</subfield><subfield code="h">v, 197 pages</subfield><subfield code="k">Community experience distilled.</subfield><subfield code="z">9781783980420</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=836621</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH27085961</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1774323</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10921224</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">836621</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis29662594</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12055187</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Juvenile works fast |
genre_facet | Juvenile works |
id | ZDB-4-EBA-ocn891381417 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:13Z |
institution | BVB |
isbn | 9781783980437 1783980435 1783980427 9781783980420 |
language | English |
oclc_num | 891381417 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (216 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing Ltd, |
record_format | marc |
series | Community experience distilled. |
series2 | Community Experience Distilled |
spelling | Lott, Steven F., author. Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / Steven F. Lott ; cover image by Jarek Blaminsky. Birmingham, England : Packt Publishing Ltd, 2014. ©2014 1 online resource (216 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Community Experience Distilled Online resource; title from PDF title page (ebrary, viewed September 4, 2014). Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Our Espionage Toolkit; Getting the tools of the trade -- Python 3.3; Windows secrets; Mac OS X secrets; Getting more tools -- a text editor; Getting other developer tools; Getting a tool to get more Python components; Confirming our tools; How do we stop?; Using the help() system; Mac OS and GNU/Linux secrets; Windows secrets; Using the help mode; Background briefing -- math and numbers; The usual culprits; The ivory tower of numbers; Integer numbers; Rational numbers. Floating-point numbersDecimal numbers; Complex numbers; Outside the numbers; Assigning values to variables; Writing scripts and seeing output; Gathering user input; Handling exceptions; Looping and trying again; Handling text and strings; Converting between numbers and strings; Parsing strings; Organizing our software; Working with files and folders; Creating a file; Reading a file; Defining more complex logical conditions; Solving problems -- recovering a lost password; Reading a word corpus; Reading a ZIP archive; Using brute-force search; Summary; Chapter 2: Acquiring Intelligence Data. Accessing data from the InternetBackground briefing -- the TCP/IP protocols; Using http.client for HTTP GET; Changing our client information; Using FTP in Python; Downloading a file via FTP; Using our FTP get() function; Using urllib for HTTP, FTP, or file access; Using urllib for FTP access; Using a REST API in Python; Getting simple REST data; Using more complex RESTful queries; Saving our data via JSON; Organizing collections of data; Using a Python list; Using list index operations; Using a Python tuple; Using generator expressions with list-of-tuples; Using a Python dictionary mapping. Using the dictionary access methodsTransforming sequences with generator functions; Using the defaultdict and counter mappings; Using a Python set; Using the for statement with a collection; Using Python operators on collections; Solving problems -- currency conversion rates; Summary; Chapter 3: Encoding Secret Messages with Steganography; Background briefing -- handling file formats; Working with the OS filesystem; glob; os; Processing simple text files; Working with ZIP files; Working with JSON files; Working with CSV files; JPEG and PNG graphics -- pixels and metadata. Using the Pillow libraryAdding the required supporting libraries; GNU/Linux secrets; Mac OS X secrets; Windows secrets; Installing and confirming Pillow; Decoding and encoding image data; Manipulating images -- resizing and thumbnails; Manipulating images -- cropping; Manipulating images -- enhancing; Manipulating images -- filtering; Manipulating images -- ImageOps; Some approaches to steganography; Getting the red-channel data; Extracting bytes from Unicode characters; Manipulating bits and bytes; Assembling the bits; Encoding the message; Decoding a message; Detecting and preventing tampering. If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial to get the most out of the book. English. Web sites Authoring programs. http://id.loc.gov/authorities/subjects/sh98000036 Web site development Computer software. Python (Computer program language) Juvenile literature. Sites Web Systèmes-auteur. Python (Langage de programmation) Ouvrages pour la jeunesse. COMPUTERS General. bisacsh Python (Computer program language) fast Web sites Authoring programs fast Juvenile works fast Blaminsky, Jarek, cover designer. Print version: Lott, Steven F. Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents. Birmingham, England : Packt Publishing Ltd, ©2014 v, 197 pages Community experience distilled. 9781783980420 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=836621 Volltext |
spellingShingle | Lott, Steven F. Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / Community experience distilled. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Our Espionage Toolkit; Getting the tools of the trade -- Python 3.3; Windows secrets; Mac OS X secrets; Getting more tools -- a text editor; Getting other developer tools; Getting a tool to get more Python components; Confirming our tools; How do we stop?; Using the help() system; Mac OS and GNU/Linux secrets; Windows secrets; Using the help mode; Background briefing -- math and numbers; The usual culprits; The ivory tower of numbers; Integer numbers; Rational numbers. Floating-point numbersDecimal numbers; Complex numbers; Outside the numbers; Assigning values to variables; Writing scripts and seeing output; Gathering user input; Handling exceptions; Looping and trying again; Handling text and strings; Converting between numbers and strings; Parsing strings; Organizing our software; Working with files and folders; Creating a file; Reading a file; Defining more complex logical conditions; Solving problems -- recovering a lost password; Reading a word corpus; Reading a ZIP archive; Using brute-force search; Summary; Chapter 2: Acquiring Intelligence Data. Accessing data from the InternetBackground briefing -- the TCP/IP protocols; Using http.client for HTTP GET; Changing our client information; Using FTP in Python; Downloading a file via FTP; Using our FTP get() function; Using urllib for HTTP, FTP, or file access; Using urllib for FTP access; Using a REST API in Python; Getting simple REST data; Using more complex RESTful queries; Saving our data via JSON; Organizing collections of data; Using a Python list; Using list index operations; Using a Python tuple; Using generator expressions with list-of-tuples; Using a Python dictionary mapping. Using the dictionary access methodsTransforming sequences with generator functions; Using the defaultdict and counter mappings; Using a Python set; Using the for statement with a collection; Using Python operators on collections; Solving problems -- currency conversion rates; Summary; Chapter 3: Encoding Secret Messages with Steganography; Background briefing -- handling file formats; Working with the OS filesystem; glob; os; Processing simple text files; Working with ZIP files; Working with JSON files; Working with CSV files; JPEG and PNG graphics -- pixels and metadata. Using the Pillow libraryAdding the required supporting libraries; GNU/Linux secrets; Mac OS X secrets; Windows secrets; Installing and confirming Pillow; Decoding and encoding image data; Manipulating images -- resizing and thumbnails; Manipulating images -- cropping; Manipulating images -- enhancing; Manipulating images -- filtering; Manipulating images -- ImageOps; Some approaches to steganography; Getting the red-channel data; Extracting bytes from Unicode characters; Manipulating bits and bytes; Assembling the bits; Encoding the message; Decoding a message; Detecting and preventing tampering. Web sites Authoring programs. http://id.loc.gov/authorities/subjects/sh98000036 Web site development Computer software. Python (Computer program language) Juvenile literature. Sites Web Systèmes-auteur. Python (Langage de programmation) Ouvrages pour la jeunesse. COMPUTERS General. bisacsh Python (Computer program language) fast Web sites Authoring programs fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh98000036 |
title | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / |
title_auth | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / |
title_exact_search | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / |
title_full | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / Steven F. Lott ; cover image by Jarek Blaminsky. |
title_fullStr | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / Steven F. Lott ; cover image by Jarek Blaminsky. |
title_full_unstemmed | Python for secret agents : analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / Steven F. Lott ; cover image by Jarek Blaminsky. |
title_short | Python for secret agents : |
title_sort | python for secret agents analyze encrypt and uncover intelligence data using python the essential tool for all aspiring secret agents |
title_sub | analyze, encrypt, and uncover intelligence data using python, the essential tool for all aspiring secret agents / |
topic | Web sites Authoring programs. http://id.loc.gov/authorities/subjects/sh98000036 Web site development Computer software. Python (Computer program language) Juvenile literature. Sites Web Systèmes-auteur. Python (Langage de programmation) Ouvrages pour la jeunesse. COMPUTERS General. bisacsh Python (Computer program language) fast Web sites Authoring programs fast |
topic_facet | Web sites Authoring programs. Web site development Computer software. Python (Computer program language) Juvenile literature. Sites Web Systèmes-auteur. Python (Langage de programmation) Ouvrages pour la jeunesse. COMPUTERS General. Python (Computer program language) Web sites Authoring programs Juvenile works |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=836621 |
work_keys_str_mv | AT lottstevenf pythonforsecretagentsanalyzeencryptanduncoverintelligencedatausingpythontheessentialtoolforallaspiringsecretagents AT blaminskyjarek pythonforsecretagentsanalyzeencryptanduncoverintelligencedatausingpythontheessentialtoolforallaspiringsecretagents |