Cargando…

Python for Automating Information Security

Learn how to use the Python programming language to automate offensive and defensive information security tasks About This Video Learn individual information security techniques using Python Use several powerful pre-built Python libraries for your own purposes Build real information security tools i...

Descripción completa

Detalles Bibliográficos
Autor principal: McNeela, Thomas (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1162607646
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 020620s2020 xx --- vleng
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1232110725  |a 1300536942  |a 1303380710 
020 |z 9781838828219 
024 8 |a 9781838828219 
029 0 |a AU@  |b 000067301096 
035 |a (OCoLC)1162607646  |z (OCoLC)1232110725  |z (OCoLC)1300536942  |z (OCoLC)1303380710 
049 |a UAMI 
100 1 |a McNeela, Thomas,  |e author. 
245 1 0 |a Python for Automating Information Security  |h [electronic resource] /  |c McNeela, Thomas. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 2 hr., 39 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Learn how to use the Python programming language to automate offensive and defensive information security tasks About This Video Learn individual information security techniques using Python Use several powerful pre-built Python libraries for your own purposes Build real information security tools in Python! In Detail The process of finding and eradicating an attacker is time-consuming and costs a lot, which hurts your organization. You need to write tools that will help you automate your defensive and offensive security. As a penetration tester, you need to evolve quickly. When off-the-shelf tools and exploits fall short, writing your own tool will help you safeguard your data. In this course, learn how to leverage Python to perform routine tasks quickly and efficiently. You will automate log analysis and packet analysis with file operations, regular expressions, and analysis modules; interact with websites to collect intelligence; and develop TCP client and server applications for use in penetration testing. You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own! By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world. 
538 |a Mode of access: World Wide Web. 
542 |f Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed May 28, 2020) 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari.  |n Available via World Wide Web.,  |d 2020. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a Safari, an O'Reilly Media Company. 
776 |z 1-83882-821-4 
856 4 0 |u https://learning.oreilly.com/videos/~/9781838828219/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP