Mastering Python for Networking and Security
Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issuesPaperback Engels 2021 9781839217166
It’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats.
Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment.
This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You’ll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you’ll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you’ll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts.
By the end of this Python book, you’ll be able to use Python to build secure apps using cryptography and steganography techniques.
Geef uw waardering
Chapter 1: Working with Python Scripting
Chapter 2: System Programming Packages
Section 2: Network Scripting and Extracting Information from the Tor Network with Python
Chapter 3: Socket Programming
Chapter 4: HTTP Programming
Chapter 5: Connecting to the Tor Network and Discovering Hidden Services
Section 3: Server Scripting and Port Scanning with Python
Chapter 6: Gathering Information from Servers
Chapter 7: Interacting with FTP, SFTP, and SSH Servers
Chapter 8: Working with Nmap Scanner
Section 4: Server Vulnerabilities and Security in Python Modules
Chapter 9: Interacting with Vulnerability Scanners
Chapter 10: Identifying Server Vulnerabilities in Web Applications
Chapter 11: Security and Vulnerabilities in Python Modules
Section 5: Python Forensics
Chapter 12: Python Tools for Forensics Analysis
Chapter 13: Extracting Geolocation and Metadata from Documents, Images, and Browsers
Chapter 14: Cryptography and Steganography
Aanbevolen live events...
Amsterdam Business Forum 2023
Mensen die dit boek kochten, kochten ook...
Managementboek Top 100
- Algemeen management
- Coaching en trainen
- Communicatie en media
- Financieel management
- Inkoop en logistiek
- Internet en social media
- IT-management / ICT
- Mens en maatschappij
- Personal finance
- Persoonlijke effectiviteit
- Reclame en verkoop
- Strategisch management
- Werk en loopbaan