Python for cybersecurity : (Record no. 257179)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02265nam a2200301 i 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | TH-BaBU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240716103624.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220204s2022 nju fo 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | TH-BaBU |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119850656 (electronic bk.) |
International Standard Book Number | 9781119850700 (electronic bk.) |
International Standard Book Number | 9781119850649 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.73.P98 |
Item number | P67 2022 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Poston, Howard E. |
245 10 - TITLE STATEMENT | |
Title | Python for cybersecurity : |
Remainder of title | using Python for cyber offense and defense / |
Statement of responsibility, etc. | Howard E. Poston III. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, N.J. : |
Name of producer, publisher, distributor, manufacturer | John Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | ©2022 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
500 ## - GENERAL NOTE | |
General note | Includes index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Python (Computer program language) |
Topical term or geographic name entry element | Computer security. |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3166511">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3166511</a> |
Public note | Electronic Resources |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | E-Book |
No items available.