LEADER 03805nam 22007815 450 001 9910299702503321 005 20200630100622.0 010 $a3-662-44437-2 024 7 $a10.1007/978-3-662-44437-5 035 $a(CKB)3710000000342463 035 $a(EBL)1966042 035 $a(SSID)ssj0001424396 035 $a(PQKBManifestationID)11748696 035 $a(PQKBTitleCode)TC0001424396 035 $a(PQKBWorkID)11362955 035 $a(PQKB)11026288 035 $a(DE-He213)978-3-662-44437-5 035 $a(MiAaPQ)EBC1966042 035 $a(PPN)183516826 035 $a(EXLCZ)993710000000342463 100 $a20150119d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUnderstanding Network Hacks $eAttack and Defense with Python /$fby Bastian Ballmann 205 $a1st ed. 2015. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2015. 215 $a1 online resource (187 p.) 300 $aTranslation from the German language edition "Network Hacks - Intensivkurs", © Springer -Verlag, 2012. 311 $a3-662-44436-4 320 $aIncludes bibliographical references and index. 327 $aInstallation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index. 330 $aThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. 606 $aComputer communication systems 606 $aComputer engineering 606 $aComputer security 606 $aProgramming languages (Electronic computers) 606 $aSoftware engineering 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputer Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I27000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 615 0$aComputer communication systems. 615 0$aComputer engineering. 615 0$aComputer security. 615 0$aProgramming languages (Electronic computers). 615 0$aSoftware engineering. 615 14$aComputer Communication Networks. 615 24$aComputer Engineering. 615 24$aSystems and Data Security. 615 24$aProgramming Languages, Compilers, Interpreters. 615 24$aSoftware Engineering. 615 24$aSoftware Engineering/Programming and Operating Systems. 676 $a004 676 $a004.6 676 $a005.1 676 $a005.13 676 $a005.8 676 $a621.39 700 $aBallmann$b Bastian$4aut$4http://id.loc.gov/vocabulary/relators/aut$01061089 906 $aBOOK 912 $a9910299702503321 996 $aUnderstanding Network Hacks$92517426 997 $aUNINA