Beginning Ethical Hacking with Python

Beginning Ethical Hacking with Python

Book Description
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.

What You Will Learn
  • Discover the legal constraints of ethical hacking
  • Work with virtual machines and virtualization
  • Develop skills in Python 3
  • See the importance of networking in ethical hacking
  • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. 


Part I 
Chapter 1: Legal Side of Hacking
Chapter 2: Hacking Environment 
Chapter 3: Installing Virtual Box 
Chapter 4: Installing Kali Linux and Other Operating Systems on VB
Chapter 5: Linux Terminal, Basic Commands

Part II
Chapter 6: Python 3 and Ethical Hacking
Chapter 7: Python Environment 
Chapter 8: General Syntaxes 
Chapter 9: Variables, Objects and Values 
Chapter 10: Conditionals 
Chapter 11: Loops 
Chapter 12: Regular Expressions
Chapter 13: Exceptions, Catching Errors 
Chapter 14: Functions 
Chapter 15: Classes 
Chapter 16: String Methods 
Chapter 17: File Input And Output 
Chapter 18: Containers 
Chapter 19: Database 
Chapter 20: Module 
Chapter 21: Debugging, Unittest Module 
Chapter 22: Socket and Networking 
Chapter 23: Importing Nmap Module 
Chapter 24: Building an Nmap Network Scanner 

Part III 
Chapter 25: Protect Anonymity on the Internet 
Chapter 26: Dark Web and Tor 
Chapter 27: Proxy Chains 
Chapter 28: Virtual Private Network or VPN 
Chapter 29: MAC Address 

Download Beginning Ethical Hacking with Python PDF or ePUB format free

Free sample

Download in .PDF format

Download in .ePUB format

Add comments
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив
Copyright © 2019