Discover an up-to-date and authoritative exploration of Python cybersecurity strategies
Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
"synopsis" may belong to another edition of this title.
HOWARD E. POSTON III is a freelance consultant and content creator with a professional focus on blockchain and cybersecurity. He has over ten years’ experience in programming with Python and has developed and taught over a dozen courses teaching cybersecurity. He is a sought-after speaker on blockchain and cybersecurity at international security conferences.
REAL-WORLD CYBERSECURITY APPLICATIONS FOR PYTHON
The Python programming language is easy to learn, tremendously powerful, and increasingly being used for sophisticated cybersecurity applications. Python is capable of delivering both offensive and defensive cybersecurity automation, reducing the cost in time and money for network security professionals engaged in defending small and large systems.
In Python® for Cybersecurity: Using Python for Cyber Offense and Defense, veteran blockchain and cybersecurity educator Howard Poston offers readers a structured and hands-on introduction to the use of Python in the context of computer security. Using the MITRE ATT&CK framework as a set of guideposts, the book explores the lifecycle of a cyberattack and how Python code can be used to overcome critical challenges and threats at each stage of the attack process.
Perfect for cybersecurity professionals―including SOC analyst penetration testers, and Chief Information Security Officers―Python for Cybersecurity will also earn a place in the libraries of Python programmers and cybersecurity enthusiasts seeking an incisive and practical exploration of the cybersecurity applications of one of the world’s most popular programming languages.
Along with real-world use cases and fully functional code examples, the book provides readers with Python applications in a wide variety of areas, including:
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Orion Tech, Kingwood, TX, U.S.A.
paperback. Condition: Good. Seller Inventory # 1119850649-3-34274423
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # 42497316-6
Quantity: 1 available
Seller: Good Buy 2 You LLC, Fredericksburg, VA, U.S.A.
paperback. Condition: Very Good. Small bump at top left cover edge. Clean, flat pages. No markings. No creases. Seller Inventory # N-01027
Quantity: 1 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Seller Inventory # 9781119850649
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 43075400-n
Quantity: Over 20 available
Seller: Follow Books, SOUTHFIELD, MI, U.S.A.
Condition: New. New Book. Seller Inventory # 1119850649-TUX
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 43075400
Quantity: Over 20 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condition: new. Paperback. Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and executionPersistence, privilege escalation, defense evasion, and credential accessDiscovery, lateral movement, collection, and command and controlExfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781119850649
Quantity: 1 available
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
Paperback. Condition: New. Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATTandCK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and executionPersistence, privilege escalation, defense evasion, and credential accessDiscovery, lateral movement, collection, and command and controlExfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them. Seller Inventory # LU-9781119850649
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # FW-9781119850649
Quantity: 15 available