
Title

Hacking tico con herramientas Python (Colecciones ABG Informtica y Computacin) (Spanish Edition),Used
Delivery time: 8-12 business days (International)
El objetivo del libro es capacitar a los interesados en la seguridad, aprender a utilizar Python como lenguaje de programacin para construir aplicaciones, automatizar y especificar las tareas durante un proceso de auditora de seguridad (Description in English below).Se repasan los mdulos que ofrece python para extraer informacin que los servidores exponen de forma pblica y los mdulos que permiten extraer metadatos de documentos e imgenes, as como extraer informacin de geolocalizacin a partir de direcciones IP y nombres de dominio y se cubren conceptos ms avanzados, como implementar nuestro propio escner de puertos con comandos nmap y scapy, entre otros temas.Description in English: In recent years, Python has become a language widely adopted by the computer security industry due to its simplicity, practicality, and also because of its scripting feature. Its integration with a multitude of thirdparty libraries suggests Python as a language with multiple possibilities both from the offensive and defensive point of view in terms of security. It has been used for a large number of projects, including Web programming, security tools, scripting, and automation of tasks.The purpose of the book is to train those interested in security, and on learniing how Python can be used as a programming language, not only to be able to build applications, but also to automate and specify many of the tasks that are performed during a security audit process.Basic programming concepts are reviewed to build your analysis and information extraction tool.In order to extract information from servers and services that are running information such as domain names and banners, the modules offered by Python for information extraction will be covered. These modules can extract metadata from documents and images, and also extract geolocation information from IP addresses and domain names.More advanced concepts are also covered, such as implementing your own port scanner with nmap and scapy commands, and how to connect from Python with FTP, SSH, SNMP, Metaspoit and vulnerability scanners such as Nexpose.
By changing our most important processes and
products, we have already made a big leap forward. This ranges from the
increased use of more sustainable fibers to the use of more
environmentally friendly printing processes to the development of
efficient waste management in our value chain.
⚠️ WARNING (California Proposition 65):
This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.
For more information, please visit www.P65Warnings.ca.gov.
Shipping & Returns
Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.
Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.
Shipping & Returns
Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.
Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.
Warranty
We provide a 2-year limited warranty, from the date of purchase for all our products.
If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.
This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).
Warranty
We provide a 2-year limited warranty, from the date of purchase for all our products.
If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.
This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).
Secure Payment
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.
Secure Payment
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.