Python for Cybersecurity Cookbook Nishant Krishna
(ebook)
(audiobook)
(audiobook)
- Autor:
- Nishant Krishna
- Wydawnictwo:
- BPB Publications
- Ocena:
- Stron:
- 514
- Dostępne formaty:
-
ePubMobi
Czytaj fragment
Opis
książki
:
Python for Cybersecurity Cookbook
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more
Key Features
Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing.
Implement defensive strategies to protect systems, networks, and data from cyber threats.
Discover advanced offensive techniques for penetration testing, exploiting vulnerabilities, and assessing overall security posture. Description
Python is a powerful and versatile programming language that can be used for a wide variety of tasks, including general-purpose applications and specific use cases in cybersecurity.
This book is a comprehensive guide to solving simple to moderate complexity problems in cybersecurity using Python. It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing.
By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. What you will learn
Learn how to use Python for cyber forensic analysis.
Explore ways to analyze malware and phishing-based compromises.
Use network utilities to gather information, monitor network activity, and troubleshoot issues.
Learn how to extract and analyze hidden information in digital files.
Examine source code for vulnerabilities and reverse engineering to understand software behavior. Who this book is for
The book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field. Table of Contents
1. Getting Started
2. Passive Reconnaissance
3. Active Reconnaissance
4. Development Environment for Advanced Techniques
5. Forensic Analysis
6. Metadata Extraction and Parsing
7. Malware and Phishing Analysis
8. Working with Wireless Devices
9. Working with Network Utilities
10. Source Code Review and Reverse Engineering
11. System Hardening, Discovery, and Implementation
12. Defensive Security Techniques
13. Offensive Security Techniques and Pen Testing
Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing.
Implement defensive strategies to protect systems, networks, and data from cyber threats.
Discover advanced offensive techniques for penetration testing, exploiting vulnerabilities, and assessing overall security posture. Description
Python is a powerful and versatile programming language that can be used for a wide variety of tasks, including general-purpose applications and specific use cases in cybersecurity.
This book is a comprehensive guide to solving simple to moderate complexity problems in cybersecurity using Python. It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing.
By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. What you will learn
Learn how to use Python for cyber forensic analysis.
Explore ways to analyze malware and phishing-based compromises.
Use network utilities to gather information, monitor network activity, and troubleshoot issues.
Learn how to extract and analyze hidden information in digital files.
Examine source code for vulnerabilities and reverse engineering to understand software behavior. Who this book is for
The book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field. Table of Contents
1. Getting Started
2. Passive Reconnaissance
3. Active Reconnaissance
4. Development Environment for Advanced Techniques
5. Forensic Analysis
6. Metadata Extraction and Parsing
7. Malware and Phishing Analysis
8. Working with Wireless Devices
9. Working with Network Utilities
10. Source Code Review and Reverse Engineering
11. System Hardening, Discovery, and Implementation
12. Defensive Security Techniques
13. Offensive Security Techniques and Pen Testing
Wybrane bestsellery
BPB Publications - inne książki
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@helion.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
Proszę czekać...
Oceny i opinie klientów: Python for Cybersecurity Cookbook Nishant Krishna (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.