Python for cybersecurity : (Record no. 257179)

000 -LEADER
fixed length control field 02265nam a2200301 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field TH-BaBU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240716103624.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220204s2022 nju fo 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
Transcribing agency TH-BaBU
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119850656 (electronic bk.)
International Standard Book Number 9781119850700 (electronic bk.)
International Standard Book Number 9781119850649
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.P98
Item number P67 2022
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Poston, Howard E.
245 10 - TITLE STATEMENT
Title Python for cybersecurity :
Remainder of title using Python for cyber offense and defense /
Statement of responsibility, etc. Howard E. Poston III.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, N.J. :
Name of producer, publisher, distributor, manufacturer John Wiley,
Date of production, publication, distribution, manufacture, or copyright notice ©2022
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Python (Computer program language)
Topical term or geographic name entry element Computer security.
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3166511">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3166511</a>
Public note Electronic Resources
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book

No items available.


- Copyright © 2022 Library and Learning Space -

Powered by Koha