Vendeur : Greenworld Books, Arlington, TX, Etats-Unis
EUR 19,55
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : good. Fast Free Shipping â" Good condition. It may show normal signs of use, such as light writing, highlighting, or library markings, but all pages are intact and the book is fully readable. A solid, complete copy that's ready to enjoy.
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
EUR 20,21
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
EUR 19,33
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Vendeur : World of Books (was SecondSale), Montgomery, IL, Etats-Unis
EUR 25,42
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Vendeur : World of Books (was SecondSale), Montgomery, IL, Etats-Unis
EUR 25,42
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Langue: anglais
Edité par No Starch Press, San Francisco, California, 2021
ISBN 10 : 1718501129 ISBN 13 : 9781718501126
Vendeur : Smith Family Bookstore Downtown, Eugene, OR, Etats-Unis
EUR 22,31
Quantité disponible : 1 disponible(s)
Ajouter au panierSoft cover. Etat : Very Good. 2nd edition. Text clean and unmarked. Binding tight. Covers have very light wear. Edges of pages have very light wear.
EUR 32,60
Quantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2.
Langue: anglais
Edité par No Starch Press,US, San Francisco, 2021
ISBN 10 : 1718501129 ISBN 13 : 9781718501126
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
EUR 33,91
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities- everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.You'll even learn how to-Create a trojan command-and-control server using GitHubDetect sandboxing and automate common malware tasks like keylogging and screenshottingExtend the Burp Suite web-hacking toolEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machineAbuse Windows COM automationExfiltrate data from a network undetectedWhen it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 38,03
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Massive Bookshop, Greenfield, MA, Etats-Unis
EUR 40,15
Quantité disponible : 10 disponible(s)
Ajouter au panierPaperback. Etat : New.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 38,63
Quantité disponible : 2 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 38,93
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
EUR 39,12
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. 2021. 2nd Edition. Paperback. . . . . .
EUR 51,62
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 36,21
Quantité disponible : 6 disponible(s)
Ajouter au panierPaperback / softback. Etat : New. New copy - Usually dispatched within 4 working days.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 42,60
Quantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. In.
Vendeur : Kennys Bookstore, Olney, MD, Etats-Unis
EUR 47,98
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. 2021. 2nd Edition. Paperback. . . . . . Books ship from the US and Ireland.
EUR 33,69
Quantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2.
Langue: anglais
Edité par No Starch Press,US, San Francisco, 2021
ISBN 10 : 1718501129 ISBN 13 : 9781718501126
Vendeur : CitiRetail, Stevenage, Royaume-Uni
EUR 40,13
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities- everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.You'll even learn how to-Create a trojan command-and-control server using GitHubDetect sandboxing and automate common malware tasks like keylogging and screenshottingExtend the Burp Suite web-hacking toolEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machineAbuse Windows COM automationExfiltrate data from a network undetectedWhen it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Langue: anglais
Edité par No Starch Press,US, San Francisco, 2021
ISBN 10 : 1718501129 ISBN 13 : 9781718501126
Vendeur : AussieBookSeller, Truganina, VIC, Australie
EUR 56,06
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities- everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.You'll even learn how to-Create a trojan command-and-control server using GitHubDetect sandboxing and automate common malware tasks like keylogging and screenshottingExtend the Burp Suite web-hacking toolEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machineAbuse Windows COM automationExfiltrate data from a network undetectedWhen it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
EUR 30,93
Quantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python. Uses Python 2.