From the Back Cover
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.
About the Author
Bastian Ballmann is a professional programmer, system engineer and member of the Chaos Computer Club since 2002. He holds lectures on network hijacking attacks as well as Bluetooth hacking and is the author of various security related tools like P.A.T.H., Blue diving and Chaosmap. In his free time he also writes the German Datenterrorist Blog and produced the podcasts Freibyte and Gesprächssituation about computer and security related stuff.
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.
评分
评分
评分
评分
风逝。基于Python 2.7。有简单介绍协议原理,优点在于相对易懂,且可操作性强。
评分风逝。基于Python 2.7。有简单介绍协议原理,优点在于相对易懂,且可操作性强。
评分风逝。基于Python 2.7。有简单介绍协议原理,优点在于相对易懂,且可操作性强。
评分风逝。基于Python 2.7。有简单介绍协议原理,优点在于相对易懂,且可操作性强。
评分风逝。基于Python 2.7。有简单介绍协议原理,优点在于相对易懂,且可操作性强。
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有