official-store-logo

Cuota promocionada en 6 cuotas de

Precio sin impuestos nacionales:

Llega gratis el miércoles 18 de junio

Solo en CABA y zonas de GBA

Comprando dentro de las próximas 19 h 16 min

Retirá gratis entre el 18 y el 23/jun en correo y otros puntos
Ver en el mapa

Las fechas de entrega incluyen los 15 días necesarios para tener listo el producto.

EL BAZAR DIGITAL

Tienda oficial de Mercado Libre

+10mil Seguidores

MercadoLíder Platinum

¡Uno de los mejores del sitio!

+10mil

Ventas concretadas

Brinda buena atención

Despacha sus productos a tiempo

Medios de pago

Cuotas sin Tarjeta

Mercado Crédito

Tarjetas de crédito

Visa
American Express
Mastercard
Naranja

Tarjetas de débito

Visa Débito
Maestro
Cabal Débito
Mastercard Débito

Efectivo

PagoFacil
Rapipago

Características del producto

Características principales

Título del libro
Violent Python A Cookbook For Hackers, Forensic Analysts, P
Autor
O'Connor, TJ
Idioma
Inglés
Editorial del libro
Syngress
Tapa del libro
Blanda
Año de publicación
2012
Marca
Syngress
Modelo
Ingles

Otros

Cantidad de páginas
288
Tipo de narración
Novela
ISBN
9781597499576

Descripción

- ANTES DE COMPRAR PREGUNTE FECHA DE ENTREGA.
- ENVIAMOS POR MERCADOENVIOS
- PUEDE RETIRAR POR AHORA SOLO POR QUILMES, MICROCENTRO ESTA CERRADO, POR ESO...
- EN CABA (CAPITAL FEDERAL) ENVIAMOS SIN CARGO ESTE PRODUCTO.
- FORMA DE PAGO : MERCADOPAGO
- HACEMOS FACTURA A.
- ELBAZARDIGITAL VENDEDOR PLATINUM
- TODOS NUESTROS PRODUCTOS EN:

https://eshops.mercadolibre.com.ar/elbazardigital

-X-X-X-

- SOMOS IMPORTADORES DIRECTOS, ESTE PRODUCTO SE COMPRA Y SE IMPORTA DESDE ESTADOS UNIDOS, ESTO IMPLICA QUE USTED ESTA COMPRANDO EL MISMO PRODUCTO QUE COMPRARÍA UN CLIENTE DE ESE PAÍS.

- ANTES DE REALIZAR UNA CONSULTA, VISUALICE TODAS LAS IMAGENES DEL PRODUCTO.
Descripción provista por la editorial :

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Review An information security specialist with the US Army, OConnor introduces the hackers programming language Python to new users, and describes some advanced features to those who already know it. --Reference and Research Book News, August 2013A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title… The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be… useful tips and tricks will surely be acquired simply by working through the exercises. --The Ethical Hacker Network, February 2013Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm. --The Ethical Hacker Network, February 2013When it comes to Python and penetration testing, TJ OConnor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...OConnor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout. --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In DepthViolent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source. --James Shewmaker, Security Analyst, Bluenotch CorporationThe best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone. --Raphael Mudge, Creator of Armitage Review Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers About the Author TJ O’Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency’s annual Cyber Defense Exercise and won the National Defense University’s first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.TJ holds a Master of Science degree in Computer Science from North Carolina State, a Mas
-o-o-o-

Garantía del vendedor: 90 días

Preguntas y respuestas

¿Qué querés saber?

Preguntale al vendedor

Nadie hizo preguntas todavía.

¡Hacé la primera!