Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Paperback. Condition: Good. Satisfaction 100% guaranteed.
Condition: good. Stains on outside cover inside the book. Cover Case has some rubbing and edgewear. Access codes, CD's, slipcovers and other accessories may not be included.
Seller: Half Price Books Inc., Dallas, TX, U.S.A.
Paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Condition: New. pp. 368.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 368.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 368.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 337 pages. 9.50x7.25x1.00 inches. In Stock.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Published by No Starch Press 2020-02-06, 2020
ISBN 10: 1593278659 ISBN 13: 9781593278656
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New.
paperback. Condition: New. Special order direct from the distributor.
Condition: new.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 337 pages. 9.50x7.25x1.00 inches. In Stock.
Taschenbuch. Condition: Neu. Black Hat Go | Go Programming for Hackers and Pentesters | Tom Steele (u. a.) | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2020 | Random House LLC US | EAN 9781593278656 | Verantwortliche Person für die EU: Springer Fachmedien Wiesbaden GmbH, Postfach:15 46, 65189 Wiesbaden, info[at]bod[dot]de | Anbieter: preigu.
Published by Random House LLC US Jan 2020, 2020
ISBN 10: 1593278659 ISBN 13: 9781593278656
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.You'll learn how to: Make performant tools that can be used for your own security projects Create usable tools that interact with remote APIs Scrape arbitrary HTML data Use Go's standard package, net/http, for building HTTP servers Write your own DNS server and proxy Use DNS tunneling to establish a C2 channel out of a restrictive network Create a vulnerability fuzzer to discover an application's security weaknesses Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer Implant data within a Portable Network Graphics (PNG) image.Are you ready to add to your arsenal of security tools Then let's Go!