Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.


What You Will Learn
  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 


1133119612
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.


What You Will Learn
  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 


24.99 In Stock
Beginning Ethical Hacking with Python

Beginning Ethical Hacking with Python

by Sanjib Sinha
Beginning Ethical Hacking with Python

Beginning Ethical Hacking with Python

by Sanjib Sinha

eBook1st ed. (1st ed.)

$24.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.


What You Will Learn
  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 



Product Details

ISBN-13: 9781484225417
Publisher: Apress
Publication date: 12/25/2016
Sold by: Barnes & Noble
Format: eBook
Pages: 201
File size: 1 MB

About the Author

Sanjib Sinha writes stories and codes - not in the same order always. He started with C# and .NET framework and won the Microsoft Community Contributor Award in 2011. Later the Open Source Software movement attracted him and he became Linux, PHP and Python enthusiast, specializing in and working on White Hat Ethical Hacking.As a beginner he had to struggled a lot to find an easier way to learn coding. No one told him that coding is like writing - imagining a concept and making it a reality with the help of words and symbols. All through his books he has tried to help the beginners from their own perspectives.

Table of Contents

Prologue - Hacker’s Goal
PART ONEChapter - 1.  Legal Side of HackingChapter - 2.  Hacking Environment2.1 - Ethical Hacking and Networking2.2 - What Does Network Mean? Chapter - 3.  What Is VirtualBox?Chapter - 4.  Install Kali Linux & Other OS in VBChapter - 5.  Linux Terminals and Basic Functionalities
PART TWOChapter 6 – Role of Python in Ethical HackingChapter 7 - Python environmentChapter 8 – General Syntaxes    8.1 - Create the main() function    8.2 - Indentation and White Space    8.3 – Commenting    8.4 - Assigning Values
Chapter 9 – Variables, Objects and Values    9.1 – Using Numbers    9.2 – String    9.3 - What is Type and ID    9.4 - Logical Values    9.5 - Tuples And Lists<    9.6 – Dictionary    9.7 – Object
Chapter 10 - Conditionals
Chapter 11 – How Loops Make Your Life Easier    11.1 – While Loops    11.2 - For Loops
Chapter 12 - Regular Expressions    12.1 – Using ‘re’ Module    12.2 - Reusing With Regular Expressions    12.3 - Searching With Regular Expressions
Chapter 13 – Exceptions, Catching Errors
Chapter 14 - Functions    14.1 - Return Values<    14.2 - Generate Functions    14.3 - Lists of Arguments    14.4 - Named Arguments
Chapter 15 - Classes    15.1 – Object Oriented Methodology    15.2 – The Foundation of Object Orientation    15.1 - Understanding Classes and Objects    15.2 – Write Your Own Game “Good VS Bad”    15.3 - Primary Class and Object    15.4 – Accessing Object Data    15.5 - Polymorphism    15.6 - Using Generators    15.7 - Inheritance    15. 8 -Decorator
Chapter 16 - String Methods
Chapter 17 - File Input and Output
Chapter 18 - Containers    18.1 - Operating on Tuple and List Object    18.2 - Operating on Dictionary Object
Chapter 19 – Database    19.1 - Let us start with SQLite3    19.2 – MySQL for Big Project
Chapter 20 - ModuleChapter 21 – Debugging, UnitTest ModuleChapter 22 - Socket and NetworkingChapter 23 – Importing Nmap ModuleChapter 24 – Building an Nmap Network Scanner
PART THREE<
Chapter  25 - Protect Your Anonymity on InternetChapter  26 – Dark Web and Tor26.1 – Hidden WikipediaChapter  27 - Proxy ChainsChapter  28 – VPNChapter  29 - Mac Address
From the B&N Reads Blog

Customer Reviews