000 | 01518cam a2200325 i 4500 | ||
---|---|---|---|
001 | 17494901 | ||
003 | IIITD | ||
005 | 20221112020002.0 | ||
008 | 121015s2013 ne b 001 0 eng | ||
010 | _a 2012030814 | ||
020 | _a9781597499576 | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.73.P98 _bO26 2013 |
082 | 0 | 0 |
_a005.133 _223 _bOCO-V |
100 | 1 | _aO'Connor, T. J. | |
245 | 1 | 0 |
_aViolent python : _ba cookbook for hackers, forensic analysts, penetration testers, and security engineers _cTJ. O'Connor. |
260 |
_bSyngress Media, _c©2013. _aBoston: |
||
300 |
_axxv, 262 p. ; _c24 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _a"Python is a hacker's language. With its decreased complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive tools already exist, learning Python can help you with the difficult cases where those tools fail"-- | ||
600 | _aPython (Computer program language) | ||
610 | _aHackers | ||
630 | _aSecurity Engineers | ||
648 | _aForensic Analysts | ||
650 | _aPenetration Testers | ||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK _03 |
||
999 |
_c10340 _d10340 |