Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Poston H. Python for Cybersecurity. Using Python...2022
poston h python cybersecurity using python 2022
Type:
E-books
Files:
1
Size:
10.5 MB
Uploaded On:
Feb. 5, 2022, 8:54 a.m.
Added By:
andryold1
Seeders:
0
Leechers:
0
Info Hash:
B056005DB94A3C290C7BF005F056FF52A1977DA7
Get This Torrent
Textbook in PDF format Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including Reconnaissance, resource development, initial access, and execution Persistence, privilege escalation, defense evasion, and credential access Discovery, lateral movement, collection, and command and control Exfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them. Introduction Fulfilling Pre-ATT&CK Objectives Gaining Initial Access Achieving Code Execution Maintaining Persistence Performing Privilege Escalation Evading Defenses Accessing Credentials Performing Discovery Moving Laterally Collecting Intelligence Implementing Command and Control Exfiltrating Data Achieving Impact
Get This Torrent
Poston H. Python for Cybersecurity. Using Python...2022.pdf
10.5 MB
Similar Posts:
Category
Name
Uploaded
E-books
Poston H. Blockchain Security from the Bottom Up...2022
Jan. 29, 2023, 9:33 a.m.