Python Ethical Hacking from Scratch : Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware

Penetration testing enables you to evaluate the security or strength of a computer system, network, or web application that an attacker can exploit. With this book, you'll understand why Python is one of the fastest-growing programming languages for penetration testing. You'll find out how to harness the power of Python and pentesting to enhance your system security.

Developers working with Python will be able to put their knowledge and experience to work with this practical guide. Complete with step-by-step explanations of essential concepts and practical examples, this book takes a hands-on approach to help you build your own pentesting tools for testing the security level of systems and networks. You'll learn how to develop your own ethical hacking tools using Python and explore hacking techniques to exploit vulnerabilities in networks and systems. Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.

By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.

Aloita kirja saman tien hintaan 0 €

  • Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Yli 52 000 ihmistä on antanut Nextorylle viisi tähteä App Storessa ja Google Playssä.

Muut ovat myös lukeneet

Ohita lista
  1. Kali Linux Web Penetration Testing Cookbook : Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x

    Gilberto Najera-Gutierrez

  2. Kali Linux - An Ethical Hacker's Cookbook : End-to-end penetration testing solutions

    Himanshu Sharma

  3. Kali Linux Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

  4. Neo4j High Performance : Design, build, and administer scalable graph database systems for your applications using Neo4j

    Sonal Raj

  5. Learn Kali Linux 2019 : Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

    Glen D. Singh

  6. Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

    Mohammed Abutheraa, Rishalin Pillay

  7. Getting Started with the Graph Query Language (GQL) : A complete guide to designing, querying, and managing graph databases with GQL

    Ricky Sun, Jason Zhang, Yuri Simione

  8. Natural Language Processing using R Pocket Primer : Learn Essential NLP Techniques and Tools for Developers

    Oswald Campesato

  9. Hands-On System Programming with C++ : Build performant and concurrent Unix and Linux systems with C++17

    Dr. Rian Quinn

  10. Linux System Programming Techniques : Become a proficient Linux system programmer using expert recipes and techniques

    Jack-Benny Persson

  11. Mastering Linux Administration : Take your sysadmin skills to the next level by configuring and maintaining Linux systems

    Alexandru Calcatinge, Julian Balog

  12. Transformers for Natural Language Processing and Computer Vision : Explore Generative AI and Large Language Models with Hugging Face, ChatGPT, GPT-4V, and DALL-E 3

    Denis Rothman


Liittyvät kategoriat