Python for Cybersecurity: Using Python for Cyber Offense and Defense

0
(0)

Python for Cybersecurity: Using Python for Cyber Offense and Defense
 

  • Author:Howard E. Poston III
  • Length: 240 pages
  • Edition: 1
  • Publisher: Wiley
  • Publication Date: 2022-03-22
  • ISBN-10: 1119850649
  • ISBN-13: 9781119850649
  • Sales Rank: #2217620 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    Discover an up-to-date and authoritative exploration of Python cybersecurity strategies

    Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.

    Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:

    • Reconnaissance, resource development, initial access, and execution
    • Persistence, privilege escalation, defense evasion, and credential access
    • Discovery, lateral movement, collection, and command and control
    • Exfiltration and impact

    Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker’s objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

    中文:

    书名:用于网络安全的Python:使用Python进行网络攻击和防御

    了解最新且权威的Python网络安全策略探索

    用于网络安全的Python:使用Python进行网络攻击和防御它提供了使用Python进行网络安全的直观和实际操作说明。它依赖于MITRE ATT&CK框架来构建其对网络攻击技术、攻击防御以及当今网络管理员和其他利益相关者面临的关键网络安全挑战的探索。

    本书提供了可下载的示例代码,旨在帮助您了解如何在各种网络安全情况下使用Python,包括:

    • 侦察、资源开发、初始访问和执行
    • 持久性、权限提升、防御规避和凭据访问
    • 发现、横向移动、收集以及指挥和控制
    • Exfiltration and impact

    每一章都包括几种技术和子技术的讨论,这些技术和子技术可以用来在这些用例中实现攻击者的目标。对任何对网络安全有专业或个人兴趣的人来说都是理想的资源,网络安全的巨蟒它提供了有关各种攻击的深入信息,以及针对这些攻击的有效的、基于Python的防御。

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册