Beginning ethical hacking with python / (Record no. 13147)

000 -LEADER
fixed length control field 02990cam a2200373 i 4500
001 - CONTROL NUMBER
control field 19421971
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190729100341.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161222s2017 ii a f ||1 | eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016963222
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1484225406
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484225400
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn961010715
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Transcribing agency YDX
Description conventions rda
Modifying agency BTCTA
-- OCLCQ
-- BKL
-- SINLB
-- NUI
-- IAL
-- OCLCF
-- TOH
-- BDX
-- GO3
-- DLC
-- EG-CaMIU
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.P98
Item number S545 2017
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 21
Classification number 005.8
Item number S.S. B 2017
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sinha, Sanjib,
Relator term author.
9 (RLIN) 19729
245 10 - TITLE STATEMENT
Title Beginning ethical hacking with python /
Statement of responsibility, etc Sanjib Sinha.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc West Bengal, India :
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc [2017]
300 ## - PHYSICAL DESCRIPTION
Extent xix, 201 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Prologue--hacker's goal -- Legal side of hacking -- Hacking environment -- Installing Virtual Box -- Installing Kali Linux and other operating systems on VB -- Linux terminal, basic commands -- Python 3 and ethical hacking -- Python environment -- General syntaxes -- Variables, objects and values -- Conditionals -- Loops -- Regular expressions -- Exceptions, catching errors -- Functions -- Classes -- String methods -- File input and output -- Containers -- Database -- Module -- Debugging, unittest module -- Socket and networking -- Importing Nmap module -- Building an Nmap network scanner -- Protect anonymity on the Internet -- Dark web and Tor -- Proxy chains -- Virtual private netwoork or VPN -- MAC address.
520 ## - SUMMARY, ETC.
Summary, etc "Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. [This book] touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: discover the legal constraints of ethical hacking; work with virtual machines and virtualization; develop skills in Python 3; see the importance of networking in ethical hacking; gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more"--Back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Python (Computer program language)
9 (RLIN) 3661
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programmers
General subdivision Professional ethics.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Suppress in OPAC 005.8 S.S. B 2017
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
d CS
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- M.S.
-- 796
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Cost, replacement price Price effective from Koha item type
          Main Library Main Library Main Stacks 2018-05-05 Infinity Knowledge For Distribution 2 2 005.8 S.S. B 2017 00017806 2021-08-16 2020-03-09 480.00 2018-05-05 Books

Powered by Koha