Python for cybersecurity : using python for cyber offense and defense / Howard E Poston.

By: Poston, Howard E [author.]Material type: TextTextPublication details: Indianapolis : John Wiley and Sons, c2022Description: xx, 220 pages ; 23 cmISBN: 978-1-119-85064-9Subject(s): COMPUTER SECURITY | HTTP (COMPUTER NETWORK PROTOCOL) PROGRAMMING | COMPUTER SECURITY | COMPUTER NETWORKS SECURITY MEASURESLOC classification: QA 76.9 P67 2022
Contents:
Chapter 1 : Fulfilling Pre-ATT&CK objectives. -- Chapter 2 : Gaining initial access. -- Chapter 3 : Achieving code execution. -- Chapter 4 : Maintaining persistence. -- Chapter 5 : Performing privilege escalation. -- Chapter 6 : Evading defenses. -- Chapter 7 : Accessing credentials. -- Chapter 8 : Performing discovery. -- Chapter 9 : Moving laterally. -- Chapter 10 : Collecting intelligence. -- Chapter 11 : Implementing command and control. -- Chapter 12 : Exfiltrating data. -- Chapter 13 : Achieving impact. --
Summary: Offers readers a structured and hands-on introduction to the use of Python in the context of computer security. Using the MITRE ATT&CK frameworks as a set of guideposts, Poston explores the lifecycle of a cyberattack and how Python code can be used to overcome critical challenges and threats at each stage of the attack process. Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. A resource for anyone with a professional or personal interest in cybersecurity, this volume provides in-depth information about a wide variety of attacks and effective, Python-based defenses against them. -- Provided by publisher
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Shelving location Call number Status Date due Barcode
Books Books NU Fairview College LRC
NU Fairview College LRC
School of Engineering and Technology General Circulation GC QA 76.9 P67 2022 (Browse shelf(Opens below)) Available NUFAI000005822

Includes index

Chapter 1 : Fulfilling Pre-ATT&CK objectives. --
Chapter 2 : Gaining initial access. --
Chapter 3 : Achieving code execution. --
Chapter 4 : Maintaining persistence. --
Chapter 5 : Performing privilege escalation. --
Chapter 6 : Evading defenses. --
Chapter 7 : Accessing credentials. --
Chapter 8 : Performing discovery. --
Chapter 9 : Moving laterally. --
Chapter 10 : Collecting intelligence. --
Chapter 11 : Implementing command and control. --
Chapter 12 : Exfiltrating data. --
Chapter 13 : Achieving impact. --

Offers readers a structured and hands-on introduction to the use of Python in the context of computer security. Using the MITRE ATT&CK frameworks as a set of guideposts, Poston explores the lifecycle of a cyberattack and how Python code can be used to overcome critical challenges and threats at each stage of the attack process. Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. A resource for anyone with a professional or personal interest in cybersecurity, this volume provides in-depth information about a wide variety of attacks and effective, Python-based defenses against them. --
Provided by publisher

There are no comments on this title.

to post a comment.

© 2023 NU LRC FAIRVIEW. All rights reserved. Privacy Policy I Powered by: KOHA