Asia Pacific University Library catalogue


Black hat Python : (Record no. 384115)

000 -LEADER
fixed length control field 03286cam a22004337i 4500
001 - CONTROL NUMBER
control field 22227597
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240605123656.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240605s2021 caua e 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2021287694
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781718501126 (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1718501129
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)on1249107681
040 ## - CATALOGING SOURCE
Original cataloging agency TOH
Language of cataloging eng
Transcribing agency TOH
Description conventions rda
Modifying agency SY
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .S456 2021 c.1
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Seitz, Justin,
Relator term author.
9 (RLIN) 14700
245 10 - TITLE STATEMENT
Title Black hat Python :
Remainder of title Python programming for hackers and pentesters /
Statement of responsibility, etc by Justin Seitz and Tim Arnold.
250 ## - EDITION STATEMENT
Edition statement 2nd edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Francisco, California :
Name of producer, publisher, distributor, manufacturer No Starch Press,
Date of production, publication, distribution, manufacture, or copyright notice ©2021.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 190 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Setting up your Python environment -- Basic networking tools -- Writing a sniffer -- Owning the network with Scapy -- Web hackery -- Extending Burp proxy -- GitHub command and control -- Common trojaning tasks on Windows -- Fun with exfiltration -- Windows privilege escalation -- Offensive forensics.
520 ## - SUMMARY, ETC.
Summary, etc "When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans. All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites. You'll even learn how to: Create a trojan command-and-control server using GitHub Detect sandboxing and automate common malware tasks like keylogging and screenshotting Extend the Burp Suite web-hacking tool Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine Abuse Windows COM automation Exfiltrate data from a network undetected When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python." --Amazon.com.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Python (Computer program language)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programming.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer programming.
9 (RLIN) 49000
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 49001
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Python (Computer program language)
9 (RLIN) 49002
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Handbooks and manuals.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Handbooks and manuals.
Source of term lcgft
9 (RLIN) 49003
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Arnold, Tim
Titles and other words associated with a name (Computer software developer),
Relator term author.
9 (RLIN) 49004
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, Charles Alfred,
Relator term writer of foreword.
9 (RLIN) 49005
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged Available for loan Book APU Library APU Library Open Shelf 05/06/2024 EMO IV-023868 152.87 3 4 QA76.9.A25 .S456 2021 c.1 00013086 04/02/2025 10/01/2025 1 152.87 05/06/2024 General Circulation U-2023/03/1172