000 | 02386cam a2200373Ii 4500 | ||
---|---|---|---|
001 | 1295219394 | ||
003 | APU | ||
005 | 20240326143209.0 | ||
007 | cr cnu---unuuu | ||
008 | 220204s2022 nju o 000 0 eng d | ||
020 | _a9781119850656 | ||
020 | _a1119850657 | ||
020 | _z9781119850700 | ||
020 | _z1119850703 | ||
020 | _z1119850649 | ||
020 | _z9781119850649 | ||
035 |
_a(OCoLC)1295219394 _z(OCoLC)1295212065 _z(OCoLC)1295242920 |
||
037 |
_a9781119850649 _bO'Reilly Media |
||
040 |
_aYDX _beng _erda _cYDX _dTY |
||
050 | 4 |
_aQA76.73.P98 _bP67 2022 |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aPoston, Howard E _948385 |
|
245 | 1 | 0 |
_aPython for cybersecurity : _busing Python for cyber offense and defense / _cHoward E. Poston III |
300 | _a1 online resource | ||
506 | _aAvailable to OhioLINK libraries | ||
520 | _aDiscover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them | ||
650 | 0 | _aPython (Computer program language) | |
650 | 0 | _aComputer security | |
650 | 0 |
_aComputer networks _xSecurity measures |
|
655 | 4 | _aElectronic books | |
710 | 2 | _aOhio Library and Information Network | |
776 | 0 | 8 |
_iPrint version: _z1119850649 _z9781119850649 _w(OCoLC)1263023423 |
942 |
_2lcc _cBook |
||
999 |
_c383884 _d383884 |