Effective Python penetration testing :: pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools /
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2016.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. |
Beschreibung: | 1 online resource : illustrations. |
ISBN: | 9781785280962 1785280961 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn953694635 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160718s2016 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d DEBBG |d N$T |d IDEBK |d YDXCP |d DEBSZ |d FEM |d NLE |d COO |d VT2 |d OCLCQ |d OCL |d OCLCQ |d CEF |d OCLCQ |d AGLDB |d IGB |d STF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 953053924 |a 953234258 |a 958945808 |a 968116325 |a 969016699 |a 1259210588 | ||
020 | |a 9781785280962 |q (electronic bk.) | ||
020 | |a 1785280961 |q (electronic bk.) | ||
020 | |z 9781785280696 | ||
020 | |z 1785280694 | ||
035 | |a (OCoLC)953694635 |z (OCoLC)953053924 |z (OCoLC)953234258 |z (OCoLC)958945808 |z (OCoLC)968116325 |z (OCoLC)969016699 |z (OCoLC)1259210588 | ||
037 | |a CL0500000763 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rehim, Rejah, |e author. | |
245 | 1 | 0 | |a Effective Python penetration testing : |b pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / |c Rejah Rehim. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2016. | |
300 | |a 1 online resource : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed March 1, 2017). | |
520 | |a Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. | ||
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Python (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh96008834 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Python (Langage de programmation) | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Python (Computer program language) |2 fast | |
758 | |i has work: |a Effective Python Penetration Testing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYV3PhpcWDmCVBbQBcdQD3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rehim, Rejah. |t Effective Python Penetration Testing. |b 1. |d Packt Publishing, 2016 |z 1785280694 |z 9781785280696 |w (OCoLC)949750877 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261876 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1261876 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34551270 | ||
938 | |a YBP Library Services |b YANK |n 13057679 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn953694635 |
---|---|
_version_ | 1816882354979864576 |
adam_text | |
any_adam_object | |
author | Rehim, Rejah |
author_facet | Rehim, Rejah |
author_role | aut |
author_sort | Rehim, Rejah |
author_variant | r r rr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)953694635 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05101cam a2200589 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn953694635</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">160718s2016 enka o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBBG</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">FEM</subfield><subfield code="d">NLE</subfield><subfield code="d">COO</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">953053924</subfield><subfield code="a">953234258</subfield><subfield code="a">958945808</subfield><subfield code="a">968116325</subfield><subfield code="a">969016699</subfield><subfield code="a">1259210588</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785280962</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785280961</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785280696</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1785280694</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953694635</subfield><subfield code="z">(OCoLC)953053924</subfield><subfield code="z">(OCoLC)953234258</subfield><subfield code="z">(OCoLC)958945808</subfield><subfield code="z">(OCoLC)968116325</subfield><subfield code="z">(OCoLC)969016699</subfield><subfield code="z">(OCoLC)1259210588</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000763</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rehim, Rejah,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Effective Python penetration testing :</subfield><subfield code="b">pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools /</subfield><subfield code="c">Rejah Rehim.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed March 1, 2017).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh96008834</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Python (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Python (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Effective Python Penetration Testing (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYV3PhpcWDmCVBbQBcdQD3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rehim, Rejah.</subfield><subfield code="t">Effective Python Penetration Testing.</subfield><subfield code="b">1.</subfield><subfield code="d">Packt Publishing, 2016</subfield><subfield code="z">1785280694</subfield><subfield code="z">9781785280696</subfield><subfield code="w">(OCoLC)949750877</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261876</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1261876</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis34551270</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13057679</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn953694635 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:17Z |
institution | BVB |
isbn | 9781785280962 1785280961 |
language | English |
oclc_num | 953694635 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Rehim, Rejah, author. Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / Rejah Rehim. Birmingham : Packt Publishing, 2016. 1 online resource : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file rda Community experience distilled Online resource; title from PDF title page (EBSCO, viewed March 1, 2017). Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This Book Learn to utilize your Python scripting skills to pentest a computer system, network, and web-application Get proficient at the art of assessing vulnerabilities by conducting effective penetration testing This is the ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacksWho This Book Is For This book is ideal for those who are comfortable with Python or a similar language and need no help with basic programming concepts, but want to understand the basics of penetration testing and the problems pentesters face. What You Will Learn Write Scapy scripts to investigate network traffic Get to know application fingerprinting techniques with Python Understand the attack scripting techniques Write fuzzing tools with pentesting requirements Learn basic attack scripting methods Utilize cryptographic toolkits in Python Automate pentesting with Python tools and librariesIn Detail Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries. Style and approach This is an expert's guide to Python with a practical based approach, where each chapter will help you improve your penetration testing skills using Python to become a master pen tester. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Python (Computer program language) http://id.loc.gov/authorities/subjects/sh96008834 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. Python (Langage de programmation) COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Computer networks Security measures fast Python (Computer program language) fast has work: Effective Python Penetration Testing (Text) https://id.oclc.org/worldcat/entity/E39PCYV3PhpcWDmCVBbQBcdQD3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Rehim, Rejah. Effective Python Penetration Testing. 1. Packt Publishing, 2016 1785280694 9781785280696 (OCoLC)949750877 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261876 Volltext |
spellingShingle | Rehim, Rejah Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / Community experience distilled. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Python (Computer program language) http://id.loc.gov/authorities/subjects/sh96008834 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. Python (Langage de programmation) COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Computer networks Security measures fast Python (Computer program language) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh96008834 |
title | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / |
title_auth | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / |
title_exact_search | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / |
title_full | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / Rejah Rehim. |
title_fullStr | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / Rejah Rehim. |
title_full_unstemmed | Effective Python penetration testing : pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / Rejah Rehim. |
title_short | Effective Python penetration testing : |
title_sort | effective python penetration testing pen test your system like a pro and overcome vulnerabilities by leveraging python scripts libraries and tools |
title_sub | pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools / |
topic | Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Python (Computer program language) http://id.loc.gov/authorities/subjects/sh96008834 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. Python (Langage de programmation) COMPUTERS Security Networking. bisacsh Penetration testing (Computer security) fast Computer networks Security measures fast Python (Computer program language) fast |
topic_facet | Penetration testing (Computer security) Computer networks Security measures. Python (Computer program language) Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. Python (Langage de programmation) COMPUTERS Security Networking. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261876 |
work_keys_str_mv | AT rehimrejah effectivepythonpenetrationtestingpentestyoursystemlikeaproandovercomevulnerabilitiesbyleveragingpythonscriptslibrariesandtools |