Cargando…

Python for cybersecurity : using Python for cyber offense and defense /

Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Poston, Howard E.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley, [2022]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1295219394
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 220204s2022 nju o 000 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d OEM  |d N$T  |d ORMDA  |d OCLCF  |d UKAHL  |d YDXIT  |d TEFOD  |d OCLCO  |d OCLCQ 
019 |a 1295212065  |a 1295242920 
020 |a 9781119850656  |q electronic book 
020 |a 1119850657  |q electronic book 
020 |a 9781119850700  |q (electronic bk.) 
020 |a 1119850703  |q (electronic bk.) 
020 |z 1119850649 
020 |z 9781119850649 
029 1 |a AU@  |b 000071547468 
035 |a (OCoLC)1295219394  |z (OCoLC)1295212065  |z (OCoLC)1295242920 
037 |a 9781119850649  |b O'Reilly Media 
037 |a C82BA0D0-75EB-42BD-ADF8-B13A352A20A9  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.73.P98  |b P67 2022 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Poston, Howard E. 
245 1 0 |a Python for cybersecurity :  |b using Python for cyber offense and defense /  |c Howard E. Poston III. 
264 1 |a Hoboken, NJ :  |b John Wiley,  |c [2022] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them. 
588 |a Description based on online resource; title from digital title page (viewed on April 15, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Python (Computer program language) 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Python (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Python (Computer program language)  |2 fast  |0 (OCoLC)fst01084736 
776 0 8 |i Print version:  |z 1119850649  |z 9781119850649  |w (OCoLC)1263023423 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119850649/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39674608 
938 |a YBP Library Services  |b YANK  |n 302707437 
938 |a EBSCOhost  |b EBSC  |n 3166511 
994 |a 92  |b IZTAP