![]() and 14: xii Contents 9 Feeling Bluetooth on.and 6: Bastian Ballmann Uster, Switzerland.If you want to dig deeper, you should afterward get some special lecture in your special field of interest. You will only get somewhat more than the basics. The length of the book doesn’t allow for in-depth discussion of all topics. Law depending on the country your device is connected in. Of course a book like this needs a disclaimer, and the author would be happy if all readers only play on systems they are allowed to do so and use the information of this book only for good and ethical actions, otherwise, you may be breaking a ![]() Readers, who know how to program in Python and dream in OSI layers or packet headers, can right away jump to Chap. You will get through all the knowledge you need to understand the source codes of the book in Chaps. You neither need deep knowledge on how computer networks are built up nor in programming. The content should also be useful for white, gray, and black hat hackers, who prefer Python for coding, as well as for curious computer users, who want to get their hands on practical IT security and are interested in learning to see their network through the eyes of an attacker. This book addresses interested Python programmers who want to learn about network coding and administrators who want to actively check the security of their systems and networks.
0 Comments
Leave a Reply. |