Understanding Network Hacks Attack and Defense with Python /

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Go...

Full description

Bibliographic Details
Published in:Springer eBooks
Main Author: Ballmann, Bastian (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-662-44437-5
Перейти в каталог НБ ТГУ
LEADER 02843nam a22005415i 4500
001 vtls000561516
003 RU-ToGU
005 20210922090531.0
007 cr nn 008mamaa
008 170213s2015 gw | s |||| 0|eng d
020 |a 9783662444375  |9 978-3-662-44437-5 
024 7 |a 10.1007/978-3-662-44437-5  |2 doi 
035 |a to000561516 
039 9 |y 201702130042  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Ballmann, Bastian.  |e author.  |9 469074 
245 1 0 |a Understanding Network Hacks  |h electronic resource  |b Attack and Defense with Python /  |c by Bastian Ballmann. 
260 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2015.  |9 742158 
300 |a XIV, 178 p. 26 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index. 
520 |a This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Computer communication systems.  |9 460401 
650 0 |a Software engineering.  |9 566225 
650 0 |a Programming languages (Electronic computers).  |9 459680 
650 0 |a Computer security.  |9 348012 
650 0 |a Computer engineering.  |9 303142 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Computer Communication Networks.  |9 566243 
650 2 4 |a Computer Engineering.  |9 303142 
650 2 4 |a Systems and Data Security.  |9 303939 
650 2 4 |a Programming Languages, Compilers, Interpreters.  |9 303287 
650 2 4 |a Software Engineering.  |9 566285 
650 2 4 |a Software Engineering/Programming and Operating Systems.  |9 303115 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
856 4 0 |u http://dx.doi.org/10.1007/978-3-662-44437-5 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=416232 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647) 
999 |c 416232  |d 416232