Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Book, 2015
Current format, Book, 2015, , Available .
Book, 2015
Current format, Book, 2015, , Available . Offered in 0 more formats
"Explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking"--Page 4 of cover.
From the community