|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1295219394 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220204s2022 nju o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|c YDX
|d OEM
|d N$T
|d ORMDA
|d OCLCF
|d UKAHL
|d YDXIT
|d TEFOD
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1295212065
|a 1295242920
|
020 |
|
|
|a 9781119850656
|q electronic book
|
020 |
|
|
|a 1119850657
|q electronic book
|
020 |
|
|
|a 9781119850700
|q (electronic bk.)
|
020 |
|
|
|a 1119850703
|q (electronic bk.)
|
020 |
|
|
|z 1119850649
|
020 |
|
|
|z 9781119850649
|
029 |
1 |
|
|a AU@
|b 000071547468
|
035 |
|
|
|a (OCoLC)1295219394
|z (OCoLC)1295212065
|z (OCoLC)1295242920
|
037 |
|
|
|a 9781119850649
|b O'Reilly Media
|
037 |
|
|
|a C82BA0D0-75EB-42BD-ADF8-B13A352A20A9
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.73.P98
|b P67 2022
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Poston, Howard E.
|
245 |
1 |
0 |
|a Python for cybersecurity :
|b using Python for cyber offense and defense /
|c Howard E. Poston III.
|
264 |
|
1 |
|a Hoboken, NJ :
|b John Wiley,
|c [2022]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on April 15, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Python (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|0 (OCoLC)fst01084736
|
776 |
0 |
8 |
|i Print version:
|z 1119850649
|z 9781119850649
|w (OCoLC)1263023423
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119850649/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39674608
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302707437
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3166511
|
994 |
|
|
|a 92
|b IZTAP
|