4144 25

[书籍介绍] 【好书首发 价值RMB500】Violent Python shows you how to move from a theoretical [推广有奖]

贵宾

已卖:8651份资源

学术权威

10%

还不是VIP/贵宾

-

TA的文库  其他...

Data Mining

威望
3
论坛币
84087 个
通用积分
5682.7684
学术水平
669 点
热心指数
648 点
信用等级
501 点
经验
8887 点
帖子
3374
精华
20
在线时间
2896 小时
注册时间
2012-11-11
最后登录
2025-12-30

初级学术勋章 初级热心勋章 初级信用勋章 中级学术勋章 中级热心勋章 中级信用勋章 高级学术勋章 高级热心勋章 高级信用勋章

楼主
狂热的爱好者 学生认证  发表于 2014-11-11 15:59:52 |AI写论文

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币
Unnamed QQ Screenshot20141111155418.png
基本信息
  • 出版社: Syngress; 1 (2012年11月22日)
  • 平装: 288页
  • 语种: 英语
  • ISBN: 1597499579
  • 条形码: 8601401420668
  • 商品尺寸: 19.1 x 1.5 x 23.5 cm
  • 商品重量: 408 g
  • ASIN: 1597499579



媒体推荐

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it."--Reference and Research Book News, August 2013

"A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title. The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be. useful tips and tricks will surely be acquired simply by working through the exercises."--The Ethical Hacker Network,February 27, 2013

"Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."--The Ethical Hacker Network,February 27, 2013

"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."--Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth

"Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."--James Shewmaker, Security Analyst, Bluenotch Corporation

"The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."--Raphael Mudge, Creator of Armitage



作者简介

TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

目 录

1. Introduction

2. Penetration Testing with Python

3. Forensic Investigations with Python

4. Network Traffic Analysis with Python

5. Wireless Mayhem with Python

6. Web Recon with Python

7. Antivirus Evasion with Python


本帖隐藏的内容

更多好资料可以关注我哦~

Violent Python _ a cookbook for hackers, forensic analysts, penetration testers .pdf (5.95 MB, 需要: 10 个论坛币)



Unnamed QQ Screenshot20141111155502.png

Unnamed QQ Screenshot20141111155518.png Unnamed QQ Screenshot20141111155535.png Unnamed QQ Screenshot20141111155552.png



二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Theoretical Theoretic python shows viole collective experience describes features security

已有 1 人评分论坛币 学术水平 热心指数 收起 理由
crystal8832 + 24 + 2 + 2 奖励积极上传好的资料

总评分: 论坛币 + 24  学术水平 + 2  热心指数 + 2   查看全部评分

本帖被以下文库推荐

If you want something,work for it!

沙发
songlinjl(真实交易用户) 发表于 2014-11-12 08:44:06
viduoluo

藤椅
静静宛如(未真实交易用户) 学生认证  发表于 2014-11-12 09:01:26
谢谢楼主!!!!

板凳
aasa11(真实交易用户) 发表于 2014-11-12 09:13:24
看看~~~

报纸
nonewman(未真实交易用户) 发表于 2014-11-12 10:54:44
why does it named violent

地板
acctoftony(真实交易用户) 发表于 2014-11-12 13:00:32
谢谢分享。

7
狂热的爱好者(未真实交易用户) 学生认证  发表于 2014-11-13 10:58:52
考证资源:

课程资源:
金融资源:

文件汇编:

P2P报告:

策划资源:

考研资源:

8
yinminghui(未真实交易用户) 发表于 2014-11-13 14:12:30
看看这个有什么内容

9
oink-oink(真实交易用户) 发表于 2014-11-15 14:51:28
提示: 作者被禁止或删除 内容自动屏蔽

10
陈茂冉12102429(未真实交易用户) 发表于 2014-11-16 21:11:58
谢谢分享

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注cda
拉您进交流群
GMT+8, 2025-12-31 01:48