×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

(ebook) (audiobook) (audiobook) Książka w języku 1
Autor:
Rejah Rehim
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim - okladka książki

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim - okladka książki

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim - audiobook MP3

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Rejah Rehim - audiobook CD

Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
164
Dostępne formaty:
     PDF
     ePub
     Mobi

Ebook (29,90 zł najniższa cena z 30 dni)

119,00 zł (-10%)
107,10 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

(29,90 zł najniższa cena z 30 dni)

Przenieś na półkę

Do przechowalni

Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks.
We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner.
Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries.

Wybrane bestsellery

O autorze książki

Rejah Rehim is currently the Director and CEO of Beagle Security. Previously holding the title of Security Architect at FAYA India, he is a long-time preacher of Open Source. He is a steady contributor to the Mozilla Foundation and has been featured in the San Francisco Firefox Monument. A member of the Mozilla Add-On review board, he has contributed to the development of several node modules. He has to his credit the creation of nine Mozilla Add-Ons including the very popular Clear Console Add-On which was selected as one of the best Mozilla Add-Ons of 2013. With a user base of more than 44,000, it has been more than 8,00,000 downloads to date. He has successfully created the world's first security testing browser bundle, PenQ, an Open Source Linux-based penetration testing browser bundle pre-configured with tools for spidering, advanced web searching, fingerprinting, etc.

Rejah is also an active member of OWASP and the chapter leader of OWASP Kerala. He is also an active
speaker at FAYA:80, a tech community-based in Kerala, with the mission of Free Knowledge Sharing. Besides
being a part of the Cyber Security division of FAYA, Rejah is also a student of Process Automation and has
implemented it in FAYA.

Additionally, Rejah also holds the title of Commander at Cyberdome, an initiative of the Kerala Police Department.

Technical Skills - Cybersecurity, DevOps, DevSecOps, Kubernetes, Python, Microservices, Cloud Architecting

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
107,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint