100% PP 100%25%20PP
   2,597.00 + FREE Delivery
  • M.R.P.:    2,727.12
  • You Save:    130.12 (5%)
  • Inclusive of all taxes

Pay on Delivery (Cash/Card) eligible
What is this?
What is Pay on Delivery?
Pay on Delivery (POD) includes Cash on Delivery (COD) as well as Debit card / Credit card / Net banking payments at your doorstep.
Details
Sold and fulfilled by Atlantic Publishers and Distributors (4.5 out of 5 | 2,053 ratings).
Other Sellers on Amazon
Add to Cart
   2,544.00
   65.00 Delivery charge
Sold by: Peacockbooks
List & Earn Rs.250* extra. Available in Bangalore, Mumbai, Chennai, Hyderabad. Sell on Local Finds.
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more.
See all 3 images

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Paperback – 17 Dec 2012

5.0 out of 5 stars 1 customer review

See all 2 formats and editions Hide other formats and editions
Price
New from
Paperback
   2,597.00
   2,544.00
click to open popover

Special offers and product promotions

  • Go Cashless with Visa Debit / Credit Cards: Get 10% back up to Rs.100 if you pay with a Visa Card. Offer valid for your first two cashless transactions ever on Amazon. Offer Period: 5th Jun to 30th Jun. Cashback will be credited as Amazon Pay balance Here's how (terms and conditions apply)

Frequently bought together

  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • +
  • Practical Malware Analysis – The Hands–On Guide to Dissecting Malicious Software
  • +
  • The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2ed
Total price:   5,756.00
Buy the selected items together

Product description

Review

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it." --Reference and Research Book News, August 2013

"A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title… The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be… useful tips and tricks will surely be acquired simply by working through the exercises." --The Ethical Hacker Network, February 2013

"Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm." --The Ethical Hacker Network, February 2013

"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth

"Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." --James Shewmaker, Security Analyst, Bluenotch Corporation

"The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." --Raphael Mudge, Creator of Armitage

About the Author

TJ O’Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency’s annual Cyber Defense Exercise and won the National Defense University’s first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.

TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter mobile phone number.



Product details

  • Paperback: 288 pages
  • Publisher: Syngress (17 December 2012)
  • Language: English
  • ISBN-10: 1597499579
  • ISBN-13: 978-1597499576
  • Product Dimensions: 19 x 1.7 x 23.5 cm
  • Average Customer Review: 5.0 out of 5 stars 1 customer review
  • Amazon Bestsellers Rank: #98,810 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?



Customer reviews

5.0 out of 5 stars
Share your thoughts with other customers
See all 1 customer reviews

Top customer reviews

16 March 2015
Format: Paperback|Verified Purchase
One person found this helpful
|Comment|Report abuse

Most helpful customer reviews on Amazon.com

Amazon.com: 4.2 out of 5 stars 105 reviews
George B Rolston
5.0 out of 5 starsFive Stars
27 August 2017 - Published on Amazon.com
Format: Paperback|Verified Purchase
One person found this helpful.
Jonathan Stewart
5.0 out of 5 starsHave fun
17 May 2018 - Published on Amazon.com
Format: Paperback|Verified Purchase
Trent Brown
5.0 out of 5 starsGreat for security enthusiasts
3 January 2018 - Published on Amazon.com
Format: Paperback|Verified Purchase
Fl
3.0 out of 5 starsThree Stars
13 May 2018 - Published on Amazon.com
Format: Paperback|Verified Purchase
Steven
4.0 out of 5 starsDefinitely recommend this for anyone looking to get more comfortable coding ...
26 January 2018 - Published on Amazon.com
Format: Paperback|Verified Purchase

Where's My Stuff?

Delivery and Returns

Need Help?