Python for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats
Par :Formats :
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
- Non compatible avec un achat hors France métropolitaine

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-93-5551-376-2
- EAN9789355513762
- Date de parution25/08/2023
- Protection num.Adobe DRM
- Infos supplémentairesepub
- ÉditeurBPB Publications
Résumé
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES ? Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing.? Implement defensive strategies to protect systems, networks, and data from cyber threats.? Discover advanced offensive techniques for penetration testing, exploiting vulnerabilities, and assessing overall security posture. DESCRIPTION Python is a powerful and versatile programming language that can be used for a wide variety of tasks, including general-purpose applications and specific use cases in cybersecurity. This book is a comprehensive guide to solving simple to moderate complexity problems in cybersecurity using Python.
It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing. By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. WHAT YOU WILL LEARN? Learn how to use Python for cyber forensic analysis.? Explore ways to analyze malware and phishing-based compromises.? Use network utilities to gather information, monitor network activity, and troubleshoot issues.? Learn how to extract and analyze hidden information in digital files.? Examine source code for vulnerabilities and reverse engineering to understand software behavior.
WHO THIS BOOK IS FORThe book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field.
It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing. By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. WHAT YOU WILL LEARN? Learn how to use Python for cyber forensic analysis.? Explore ways to analyze malware and phishing-based compromises.? Use network utilities to gather information, monitor network activity, and troubleshoot issues.? Learn how to extract and analyze hidden information in digital files.? Examine source code for vulnerabilities and reverse engineering to understand software behavior.
WHO THIS BOOK IS FORThe book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field.
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES ? Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing.? Implement defensive strategies to protect systems, networks, and data from cyber threats.? Discover advanced offensive techniques for penetration testing, exploiting vulnerabilities, and assessing overall security posture. DESCRIPTION Python is a powerful and versatile programming language that can be used for a wide variety of tasks, including general-purpose applications and specific use cases in cybersecurity. This book is a comprehensive guide to solving simple to moderate complexity problems in cybersecurity using Python.
It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing. By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. WHAT YOU WILL LEARN? Learn how to use Python for cyber forensic analysis.? Explore ways to analyze malware and phishing-based compromises.? Use network utilities to gather information, monitor network activity, and troubleshoot issues.? Learn how to extract and analyze hidden information in digital files.? Examine source code for vulnerabilities and reverse engineering to understand software behavior.
WHO THIS BOOK IS FORThe book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field.
It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing. By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. WHAT YOU WILL LEARN? Learn how to use Python for cyber forensic analysis.? Explore ways to analyze malware and phishing-based compromises.? Use network utilities to gather information, monitor network activity, and troubleshoot issues.? Learn how to extract and analyze hidden information in digital files.? Examine source code for vulnerabilities and reverse engineering to understand software behavior.
WHO THIS BOOK IS FORThe book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field.