Python for Cybersecurity : Using Python for Cyber Offense and Defense by Howard E. Poston III (2022, Trade Paperback)
Global Dispatch (7088)
92,9% di feedback positivi
Prezzo:
US $27,57
CircaEUR 23,79
+ $20,36 di spese di spedizione
Consegna prevista: lun 25 ago - ven 5 setConsegna prevista lun 25 ago - ven 5 set
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Condizione:
NuovoNuovo
He has over ten years' experience in programming with Python and has developed and taught over a dozen courses teaching cybersecurity. He is a sought-after speaker on blockchain and cybersecurity at international security conferences.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Informazioni su questo prodotto
Product Identifiers
PublisherWiley & Sons, Incorporated, John
ISBN-101119850649
ISBN-139781119850649
eBay Product ID (ePID)3050103514
Product Key Features
Number of Pages240 Pages
LanguageEnglish
Publication NamePython for Cybersecurity : Using Python for Cyber Offense and Defense
Publication Year2022
SubjectSecurity / Cryptography, General
TypeTextbook
AuthorHoward E. Poston III
Subject AreaMathematics, Computers
FormatTrade Paperback
Dimensions
Item Height0.8 in
Item Weight14.4 Oz
Item Length9.2 in
Item Width7.3 in
Additional Product Features
Intended AudienceScholarly & Professional
SynopsisDiscover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.