Understanding Network Hacks Attack and Defense with Python /

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Go...

Full description

Bibliographic Details
Published in:Springer eBooks
Main Author: Ballmann, Bastian (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-662-44437-5
LEADER 02475nam a22005175i 4500
001 vtls000561516
003 RU-ToGU
005 20210922090531.0
007 cr nn 008mamaa
008 170213s2015 gw | s |||| 0|eng d
020 |a 9783662444375 
024 7 |a 10.1007/978-3-662-44437-5  |2 doi 
035 |a to000561516 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Ballmann, Bastian.  |e author. 
245 1 0 |a Understanding Network Hacks  |h electronic resource  |b Attack and Defense with Python /  |c by Bastian Ballmann. 
260 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2015. 
300 |a XIV, 178 p. 26 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index. 
520 |a This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. 
650 0 |a Computer Science. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Programming languages (Electronic computers). 
650 0 |a Computer security. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Programming Languages, Compilers, Interpreters. 
650 2 4 |a Software Engineering. 
650 2 4 |a Software Engineering/Programming and Operating Systems. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
856 4 0 |u http://dx.doi.org/10.1007/978-3-662-44437-5 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647) 
999 |c 416232  |d 416232