Python for cybersecurity : using python for cyber offense and defense / Howard E Poston.
Material type:
Item type | Current library | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
![]() |
NU Fairview College LRC | NU Fairview College LRC | School of Engineering and Technology | General Circulation | GC QA 76.9 P67 2022 (Browse shelf(Opens below)) | Available | NUFAI000005822 |
Browsing NU Fairview College LRC shelves, Shelving location: General Circulation, Collection: School of Engineering and Technology Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 P38 2024 Google workspace : for dummies / | GC QA 76.9 P53 2022 Introduction to computer organization : an under-the-hood look at hardware and x86-64 assembly / | GC QA 76.9 P54 2021 Data science for dummies / | GC QA 76.9 P67 2022 Python for cybersecurity : using python for cyber offense and defense / | GC QA 76.9 V47 2019 Building design systems : Unify user experiences through a shared design language / | GC QA 76.9 W46 2020 A common-sense guide to data structures and algorithms : level up your core programming skills / | GC QA 76.9 W46 2020 A common-sense guide to data structures and algorithms : level up your core programming skills / |
Includes index
Chapter 1 : Fulfilling Pre-ATT&CK objectives. --
Chapter 2 : Gaining initial access. --
Chapter 3 : Achieving code execution. --
Chapter 4 : Maintaining persistence. --
Chapter 5 : Performing privilege escalation. --
Chapter 6 : Evading defenses. --
Chapter 7 : Accessing credentials. --
Chapter 8 : Performing discovery. --
Chapter 9 : Moving laterally. --
Chapter 10 : Collecting intelligence. --
Chapter 11 : Implementing command and control. --
Chapter 12 : Exfiltrating data. --
Chapter 13 : Achieving impact. --
Offers readers a structured and hands-on introduction to the use of Python in the context of computer security. Using the MITRE ATT&CK frameworks as a set of guideposts, Poston explores the lifecycle of a cyberattack and how Python code can be used to overcome critical challenges and threats at each stage of the attack process. Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. A resource for anyone with a professional or personal interest in cybersecurity, this volume provides in-depth information about a wide variety of attacks and effective, Python-based defenses against them. --
Provided by publisher
There are no comments on this title.