1.

Record Nr.

UNISA990000676660203316

Autore

GUTHRIE, William

Titolo

Compendio di geografia universale ragionata,storica e commerciale / William Guthrie

Pubbl/distr/stampa

A Milano : dalla stamperia e fonderia di G. G. Destefanis, 1810

Descrizione fisica

724 p. ; 22 cm

Collocazione

FV C 4 3 42 (FV C 11 1 42)

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNISA996390465203316

Autore

Emery John, doctoure in astronomye et phesyke

Titolo

Here foloweth thre practyses, nowe vsed at Mountpyller, by mon syre Emery. a romayne borne in Rome, a doctoure in astronomye [et] phesyke [[electronic resource] ] : and other doth practyse the same, fyrste an oyle, or onement, and a powder, and the. iii. a water, for many infyrmytes and deseases for the health of the body

Pubbl/distr/stampa

[[London], : Newly imprynted by me Robert wyer, [1554?]]

Descrizione fisica

[16] p. : ill

Soggetti

Medicine - France

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Printer's name from colophon; publication date conjectured by STC.

Signatures: A-B⁴.

Identified as STC 7678+ on UMI microfilm.

Reproduction of the original in the Henry E. Huntington Library and Art Gallery.



Sommario/riassunto

eebo-0113

3.

Record Nr.

UNISA996394206003316

Autore

Mayerne Théodore Turquet de, Sir, <1573-1655.>

Titolo

Equitis aurati medici et philosophi suo ævo perplurime celeberrimi Opera medica [[electronic resource] ] : complectentia consilia epistolas et observationes pharmacopeam : variasque medicamentorum formulas / / duobus libris comprehensa et jam in lucem edita, opera & cura Josephi Browne

Pubbl/distr/stampa

Londini, : Typis R.E. & prostant venales ex ædibus editoris Londini, , MDCC [1700]

Descrizione fisica

ca. 782 p. : ill., port

Altri autori (Persone)

BrowneJoseph <fl. 1706.>

Soggetti

Medicine

Lingua di pubblicazione

Latino

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Reproduction of the original in the Bodleian Library.

Sommario/riassunto

eebo-0014



4.

Record Nr.

UNINA9910136072903321

Autore

Duffy Christopher

Titolo

Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules / / Christopher Duffy

Pubbl/distr/stampa

Birmingham, England : , : Packt Publishing, , 2016

©2016

ISBN

1-78712-097-X

Edizione

[1st edition]

Descrizione fisica

1 online resource (650 pages) : illustrations (some color)

Collana

Learning path

Disciplina

005.8092

Soggetti

Penetration testing (Computer security)

Computer networks - Security measures

Python (Computer program language)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Authors: Christopher Duffy [and six others]. Cf. Credits page.

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive



information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even mor...