0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Python Penetration Testing Essentials - Techniques for ethical hacking with Python, 2nd Edition (Paperback, 2nd Revised... Python Penetration Testing Essentials - Techniques for ethical hacking with Python, 2nd Edition (Paperback, 2nd Revised edition)
Mohit Raj
R850 Discovery Miles 8 500 Ships in 10 - 15 working days

This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. Key Features Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to build efficient code and eventually build a robust environment Learn about securing wireless applications and information gathering on a web server Book DescriptionThis book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking-such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks. What you will learn The basics of network pentesting including network scanning and sniffing Wireless, wired attacks, and building traps for attack and torrent detection Web server footprinting and web application attacks, including the XSS and SQL injection attack Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking Who this book is forIf you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.

Behavioural Study of Powder Metallurgy (Paperback): Mohit Raj, Neeraj Kumar, Amit Tiwari Behavioural Study of Powder Metallurgy (Paperback)
Mohit Raj, Neeraj Kumar, Amit Tiwari
R967 Discovery Miles 9 670 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Birding In South Africa's National Parks
Rob Little Paperback R225 R176 Discovery Miles 1 760
Commando - A Boer Journal of the…
Deneys Reitz Paperback R350 R235 Discovery Miles 2 350
Kanker Schmanker!
Madelein Rust Paperback R320 R275 Discovery Miles 2 750
The Dirty Secrets Of The Rich And…
James-Brent Styan Paperback R290 R205 Discovery Miles 2 050
South African Family Law
Paperback  (5)
R1,015 R795 Discovery Miles 7 950
Van Tweeling Tot Trafalgar Square - 'n…
Portchie Paperback R295 R215 Discovery Miles 2 150
Robert - A Queer And Crooked Memoir For…
Robert Hamblin Paperback  (1)
R335 R288 Discovery Miles 2 880
Land Matters - South Africa's Failed…
Tembeka Ngcukaitobi Paperback  (4)
R320 R256 Discovery Miles 2 560
Guilty And Proud - An MK Soldier's…
Marion Sparg Paperback R330 R240 Discovery Miles 2 400
The Year Of Facing Fire - A Memoir
Helena Kriel Paperback R315 R271 Discovery Miles 2 710

 

Partners