|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Sanjib SinhaPublisher: APress Imprint: APress Edition: 1st ed. Dimensions: Width: 15.50cm , Height: 1.20cm , Length: 23.50cm Weight: 0.454kg ISBN: 9781484225400ISBN 10: 1484225406 Pages: 201 Publication Date: 27 December 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPrologue - Hacker’s Goal PART ONEChapter - 1. Legal Side of HackingChapter - 2. Hacking Environment2.1 - Ethical Hacking and Networking2.2 - What Does Network Mean? Chapter - 3. What Is VirtualBox?Chapter - 4. Install Kali Linux & Other OS in VBChapter - 5. Linux Terminals and Basic Functionalities PART TWOChapter 6 – Role of Python in Ethical HackingChapter 7 - Python environmentChapter 8 – General Syntaxes 8.1 - Create the main() function 8.2 - Indentation and White Space 8.3 – Commenting 8.4 - Assigning Values Chapter 9 – Variables, Objects and Values 9.1 – Using Numbers 9.2 – String 9.3 - What is Type and ID 9.4 - Logical Values 9.5 - Tuples And Lists< 9.6 – Dictionary 9.7 – Object Chapter 10 - Conditionals Chapter 11 – How Loops Make Your Life Easier 11.1 – While Loops 11.2 - For Loops Chapter 12 - Regular Expressions 12.1 – Using ‘re’ Module 12.2 - Reusing With Regular Expressions 12.3 - Searching With Regular Expressions Chapter 13 – Exceptions, Catching Errors Chapter 14 - Functions 14.1 - Return Values< 14.2 - Generate Functions 14.3 - Lists of Arguments 14.4 - Named Arguments Chapter 15 - Classes 15.1 – Object Oriented Methodology 15.2 – The Foundation of Object Orientation 15.1 - Understanding Classes and Objects 15.2 – Write Your Own Game “Good VS Bad” 15.3 - Primary Class and Object 15.4 – Accessing Object Data 15.5 - Polymorphism 15.6 - Using Generators 15.7 - Inheritance 15. 8 -Decorator Chapter 16 - String Methods Chapter 17 - File Input and Output Chapter 18 - Containers 18.1 - Operating on Tuple and List Object 18.2 - Operating on Dictionary Object Chapter 19 – Database 19.1 - Let us start with SQLite3 19.2 – MySQL for Big Project Chapter 20 - ModuleChapter 21 – Debugging, UnitTest ModuleChapter 22 - Socket and NetworkingChapter 23 – Importing Nmap ModuleChapter 24 – Building an Nmap Network Scanner PART THREE< Chapter 25 - Protect Your Anonymity on InternetChapter 26 – Dark Web and Tor26.1 – Hidden WikipediaChapter 27 - Proxy ChainsChapter 28 – VPNChapter 29 - Mac AddressReviewsThis book has an interesting premise-it offers to teach one how to accomplish ethical hacking tasks using Python. ... Under this guise, the book gives a good introduction to using the Python programming language's general features and spends the bulk of its pages teaching Python ... . This book falls into the introductory category for the Python programming language; therefore, it is well suited for individuals new to the language. Summing Up: Recommended. All readers. (F. H. Wild III, Choice, Vol. 54 (11), July, 2017) Author InformationSanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives. Tab Content 6Author Website:Countries AvailableAll regions |