MIU

Beginning ethical hacking with python / (Record no. 13147)

MARC details
000 -LEADER
fixed length control field 02990cam a2200373 i 4500
001 - CONTROL NUMBER
control field 19421971
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190729100341.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161222s2017 ii a f ||1 | eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2016963222
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1484225406
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484225400
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn961010715
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Transcribing agency YDX
Description conventions rda
Modifying agency BTCTA
-- OCLCQ
-- BKL
-- SINLB
-- NUI
-- IAL
-- OCLCF
-- TOH
-- BDX
-- GO3
-- DLC
-- EG-CaMIU
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.P98
Item number S545 2017
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 21
Classification number 005.8
Item number S.S. B 2017
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sinha, Sanjib,
Relator term author.
9 (RLIN) 19729
245 10 - TITLE STATEMENT
Title Beginning ethical hacking with python /
Statement of responsibility, etc Sanjib Sinha.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc West Bengal, India :
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc [2017]
300 ## - PHYSICAL DESCRIPTION
Extent xix, 201 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Prologue--hacker's goal -- Legal side of hacking -- Hacking environment -- Installing Virtual Box -- Installing Kali Linux and other operating systems on VB -- Linux terminal, basic commands -- Python 3 and ethical hacking -- Python environment -- General syntaxes -- Variables, objects and values -- Conditionals -- Loops -- Regular expressions -- Exceptions, catching errors -- Functions -- Classes -- String methods -- File input and output -- Containers -- Database -- Module -- Debugging, unittest module -- Socket and networking -- Importing Nmap module -- Building an Nmap network scanner -- Protect anonymity on the Internet -- Dark web and Tor -- Proxy chains -- Virtual private netwoork or VPN -- MAC address.
520 ## - SUMMARY, ETC.
Summary, etc "Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. [This book] touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. You will: discover the legal constraints of ethical hacking; work with virtual machines and virtualization; develop skills in Python 3; see the importance of networking in ethical hacking; gain knowledge of the dark web, hidden wikipedia, proxy chains, virtual private networks, MAC addresses, and more"--Back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Python (Computer program language)
9 (RLIN) 3661
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programmers
General subdivision Professional ethics.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Suppress in OPAC 005.8 S.S. B 2017
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
d CS
Holdings
Date last seen Total Checkouts Total Renewals Full call number Barcode Date last borrowed Cost, replacement price Price effective from Koha item type Lost status Source of classification or shelving scheme Damaged status Not for loan Withdrawn status Home library Current library Shelving location Date acquired Source of acquisition
06/08/2023 3 2 005.8 S.S. B 2017 00017806 20/02/2023 480.00 05/05/2018 Books   Dewey Decimal Classification       Main Library Main Library Main Stacks 05/05/2018 Infinity Knowledge For Distribution

Powered by Koha