Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)
 
Submit
Save for Later
Want to know when you'll get it? Go

What is “Estimated Delivery Date?”

This is an approximate delivery date and is not a guarantee. Delivery estimates are available only for select items to be delivered in the contiguous United States, excluding APO/FPO addresses and PO boxes. Your final shipping cost will be available at checkout.

Club O Rewards MasterCard®

12 Month Special Financing Available*.
No Payments & No Interest on orders over
$150 if you pay in full within 6 months.
Learn More ›
No Payments & No Interest on orders over
$150 if you pay in full within 6 months.
Learn More ›
o.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers (Paperback)

Today $34.78
Item #: 14431692
Very High Sellout Risk

    Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the ......more

People Who Viewed This Viewed

Sponsored Links What's This?

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

Author:
O'Connor, T. J.
Genre:
COMPUTERS / Networking / Security
Audience:
College/higher education
Format:
Paperback
Pages:
262
Language:
English
Publisher:
Syngress Media Inc
Publish Date:
11/08/2012
Copyright Year:
2013
ISBN:
9781597499576
Height:
9.25 in
Wdth:
7.5 in
Thickness:
0.5 in
Unit weight:
1.06 lb
Was this product information helpful?
Thank you for your feedback.
 
 
 
Thank you. Your feedback will help us create the best experience for our customers.

There are currently no product reviews for this product.

Be the first to write a review

Overstock.com values your opinion. Please take a moment and share what you like or don't like about a product.

Product Q&A

Ask a Question

Be the first to ask a question about this product.
Shipping:

This item will be delivered to you via USPS Trackable Media Mail or UPS Mail Innovations and will take from 2 days to 3 weeks from the time the item leaves our warehouse. *

Standard Return Policy:

Items must be returned in new or unused condition and contain all original materials included with the shipment. More details

FINAL SALE EXCLUSION: Items marked as FINAL SALE are not returnable unless the problem you experience is the result of our error.

* For your safety, some orders go through our loss prevention department. If we select your order for this process, we will immediately notify you that there may be up to a 3-day delay on your order.

** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be delivered.

Buy Now with Bitcoin Learn More