000 | 03056nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-662-62157-8 | ||
003 | DE-He213 | ||
005 | 20240423125432.0 | ||
007 | cr nn 008mamaa | ||
008 | 210202s2021 gw | s |||| 0|eng d | ||
020 |
_a9783662621578 _9978-3-662-62157-8 |
||
024 | 7 |
_a10.1007/978-3-662-62157-8 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUY _2bicssc |
|
072 | 7 |
_aCOM000000 _2bisacsh |
|
072 | 7 |
_aUY _2thema |
|
082 | 0 | 4 |
_a004 _223 |
100 | 1 |
_aBallmann, Bastian. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aUnderstanding Network Hacks _h[electronic resource] : _bAttack and Defense with Python 3 / _cby Bastian Ballmann. |
250 | _a2nd ed. 2021. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2021. |
|
300 |
_aXV, 220 p. 37 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aInstallation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index. | |
520 | _aThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. This book addresses interested Python programmers who want to learn about network coding and to administrators, who want to actively check the security of their systems and networks. The content should also be useful for white, gray and black hat hackers, who prefer Python for coding. You neither need deep knowledge on how computer networks are build up nor in programming. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aInternet programming. | |
650 | 0 | _aProgramming languages (Electronic computers). | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aWeb Development. |
650 | 2 | 4 | _aProgramming Language. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aMobile and Network Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783662621561 |
776 | 0 | 8 |
_iPrinted edition: _z9783662621585 |
776 | 0 | 8 |
_iPrinted edition: _z9783662621592 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-662-62157-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177898 _d177898 |