Python for Cybersecurity: Using Python for Cyber Offense and Defense : Using Python for Cyber Offense and Defense - III Howard E. Poston

Python for Cybersecurity: Using Python for Cyber Offense and Defense

Using Python for Cyber Offense and Defense

By: III Howard E. Poston

eText | 1 February 2022 | Edition Number 1

At a Glance

eText


$36.29

or 4 interest-free payments of $9.07 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.
Discover an up-to-date and authoritative exploration of Python cybersecurity strategies

Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.

Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:
  • Reconnaissance, resource development, initial access, and execution
  • Persistence, privilege escalation, defense evasion, and credential access
  • Discovery, lateral movement, collection, and command and control
  • Exfiltration and impact
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

About the Author

HOWARD POSTON (Dayton, OH) is a freelance consultant and content creator with a focus on blockchain and cybersecurity. Howard has over a decade of experience in programming with Python, and it is his preferred language for scripting and coding for cybersecurity. He has developed and taught over a dozen courses exploring and explaining various aspects of cybersecurity and has written hundreds of articles on the subject on different outlets. Howard is also the author of several academic articles on security topics and has spoken on blockchain and cybersecurity at international security conferences.
Read online on
Desktop
Tablet
Mobile

More in Data Encryption

Cybersecurity Culture - Gulsebnem Bishop

eTEXT