MARC details
000 -LEADER |
fixed length control field |
02820cam a2200445 i 4500 |
001 - CONTROL NUMBER |
control field |
18325983 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220209094807.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141006s2015 caua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2014953241 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781593275907 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn880566746 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDXCP |
Language of cataloging |
eng |
Transcribing agency |
YDXCP |
Description conventions |
rda |
Modifying agency |
OCLCQ |
-- |
BTCTA |
-- |
BDX |
-- |
OCLCQ |
-- |
B@L |
-- |
OCLCO |
-- |
CLE |
-- |
OCLCF |
-- |
DEBSZ |
-- |
DOV |
-- |
FJD |
-- |
NZAUC |
-- |
CDX |
-- |
EG-CaTKH |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S456 2015 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 SE.B 2015 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Seitz, Justin, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Black hat Python : |
Remainder of title |
Python programming for hackers and pentesters / |
Statement of responsibility, etc. |
by Justin Seitz. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Francisco : |
Name of producer, publisher, distributor, manufacturer |
No Starch Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 170 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Setting up your Python environment -- The network: basics -- The network: raw sockets and sniffing -- Owning the network with scapy -- Web hackery -- Extending Burp proxy -- GITHUB command and control -- Common trojaning tasks on Windows -- Fun with Internet Explorer -- Windows privilege escalation -- Automating offensive forensics. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Python is the high-level language of choice for hackers and software security analysts because it makes it easy to write powerful and effective security tools. A follow-up to the perennial best-seller Gray Hat Python (2011), the all-new Black Hat Python explores the darker side of Python's capabilities - writing network sniffers, manipulating packets, web hacking, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. By showing how carefully crafted code can be used to disrupt and disable a system, Black Hat Python will help you test your systems and improve your security posture. Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Python (Computer program language) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hacking. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Miller, Charlie, |
Relator term |
writer of foreword. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1931622&query=Black+hat+Python+%3A+Python+programming+for+hackers+and+pentesters">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1931622&query=Black+hat+Python+%3A+Python+programming+for+hackers+and+pentesters</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022028 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220209 |
024 3# - OTHER STANDARD IDENTIFIER |
Standard number or code |
9781593275907 |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
Python programming for hackers and pentesters |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |