Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ OConnor - PDF free download eBook

Book author:

  • Published: Sep 06, 2015
  • Reviews: 270

Brief introduction:

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the...

more details below

Details of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

ISBN
9781597499576
Publication date
Age range
18+ Years
Book language
ENG
Pages
288
Format
PDF, DJVU, EPUB, FB3
Quality
Normal quality scanned pages
Dimensions
7.50 (w) x 9.10 (h) x 0.70 (d)
Download cursor

Some brief overview of this book

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Pgional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ OConnor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agencys Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

See more interesting books:

  • Vector (Jack Stapleton Series #4) PDF
  • America Anonymous: Eight Addicts in Search of a Life PDF
  • Damaged PDF
  • Infinite Worlds: The People and Places of Space Exploration PDF
  • The Stuff of Legend: Book 1: The Dark PDF
  • The Complete Personal Memoirs of Ulysses S. Grant PDF

How to download e-book

Press button "GET DOWNLOAD LINKS" and wait 20 seconds. This time is necessary for searching and sorting links. One button - 15 links for downloading the book "Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers" in all e-book formats!

May need free signup required to download or reading online book.

A few words about book author

TJ O’Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency’s annual Cyber Defense Exercise and won the National Defense University’s first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ OConnor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agencys Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

Small FAQ about download

Book files are stored on servers owned by you?
No. We do not store files, because it is prohibited. Our site uses the API of third-party sites that store files. That is, we are doing the same thing as Google, only within the framework of one subject. Third-party sites are multimedia services that allow you to read and download e-books. By subscribing, you get access to a huge library of multimedia content, which is updated daily. Services are fully optimized for all platforms - iOS, Android and PC.
If there is a choice of file format, which format is better to download?
Modern smartphones and computers can read files of any format. But the most compatible is the *.PDF format. For example, the PDF format can be read Mozilla Firefox browser without any additions.
How long will the file be downloaded?
Very fast. We regularly check (this is a fully automatic process) the availability of servers, the links to which we offer you. If the server does not provide a quick download, then we remove it from the list.
Does the electronic version of the book completely replace the paper version?
Of course not. Best of all, if after reading an e-book, you buy a paper version of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Read the book on paper - it is quite a powerful experience.

All downloaded files are checked

EPUB

violent.python.cookbook.hackers.forensic.analysts.penetration.testers.security.engineers.epub

  • MD5: 419e4f1b9de4e80db2d8b1f977e12eb9
  • SHA1: d0cb901581d8212f0b2dd1b53f6b102640372998
checkcheckcheckcheckcheck
PDF

violent.python.cookbook.hackers.forensic.analysts.penetration.testers.security.engineers.pdf

  • MD5: c2934fa14b5587829badb226e4b7ced4
  • SHA1: 9c119bfeb3588f4a1fc2b97e85478bbd7c455f10
checkcheckcheckcheckcheck
FB2

violent.python.cookbook.hackers.forensic.analysts.penetration.testers.security.engineers.fb2

  • MD5: 412866c180f6feb7ac86a58c2ff7a468
  • SHA1: d7c55b19aa19c9de47a8dc0efb005f7507d7aea2
checkcheckcheckcheckcheck
MOBI

violent.python.cookbook.hackers.forensic.analysts.penetration.testers.security.engineers.mobi

  • MD5: 623c193b201e457ee49d595510c35029
  • SHA1: 3d93d5f9f9a53486743b79fa3ca603ff86d306c7
checkcheckcheckcheckcheck
DJVU

violent.python.cookbook.hackers.forensic.analysts.penetration.testers.security.engineers.djvu

  • MD5: eb6157352f776ab4f0b91fe50d86c8f4
  • SHA1: c4ba82565fddbafe0232d5d97e24bbc293928f37
checkcheckcheckcheckcheck