Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Buy

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and libraries to secure your network infrastructure

Book Description

It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced tasks, with the latest update introducing many new packages. This book focuses on leveraging these updated packages to build a secure network with the help of Python scripting.

This book covers topics from building a network to the different procedures you need to follow to secure it. You'll first be introduced to different packages and libraries, before moving on to different ways to build a network with the help of Python scripting. Later, you will learn how to check a network's vulnerability using Python security scripting, and understand how to check vulnerabilities in your network. As you progress through the chapters, you will also learn how to achieve endpoint protection by leveraging Python packages along with writing forensic scripts. By the end of this book, you will be able to get the most out of the Python language to build secure and robust networks that are resilient to attacks.

What you will learn

  • Develop Python scripts for automating security and pentesting tasks
  • Discover the Python standard library's main modules used for performing security-related tasks
  • Automate analytical tasks and the extraction of information from servers
  • Explore processes for detecting and exploiting vulnerabilities in servers
  • Use network software for Python programming
  • Perform server scripting and port scanning with Python
  • Identify vulnerabilities in web applications with Python
  • Use Python to extract metadata and forensics

Who this book is for

This book is ideal for network engineers, system administrators, or any security professional looking at tackling networking and security challenges. Programmers with some prior experience in Python will get the most out of this book. Some basic understanding of general programming structures and Python is required.

Table of Contents

  1. Working with Python Scripting
  2. System Programming Packages
  3. Socket Programming
  4. HTTP Programming
  5. Analyzing Network Traffic
  6. Gathering Information from Servers
  7. Interacting with FTP ,SSH and SNMP Servers
  8. Working with Nmap Scanners
  9. Connecting with Metasploit Framework
  10. Interacting with Vulnerabilities Scanner
  11. Identifying Server Vulnerabilities in Web Applications
  12. Extracting Geolocation and Metadata from Documents,Images and Browsers
  13. Cryptography and Steganography
  14. Assessments
(HTML tags aren't allowed.)

Using R for Data Analysis in Social Sciences
Using R for Data Analysis in Social Sciences
Statistical analysis is common in the social sciences, and among the more popular programs is R. This book provides a foundation for undergraduate and graduate students in the social sciences on how to use R to manage, visualize, and analyze data. The focus is on how to address substantive questions with data analysis and replicate...
Geopositioning and Mobility (ISTE)
Geopositioning and Mobility (ISTE)

This book presents a general overview of the applications and use of geopositioning and GNSS for assisting the supervision and management of mobile terrestrial professions, information, traffic regulation, multimodal information, pedestrian mobility and indoor geopositioning, etc. It especially focuses on the field of mobility and terrestrial...

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.

Simply put, this book is designed to empower and excite the...


Is Democracy Possible Here?: Principles for a New Political Debate
Is Democracy Possible Here?: Principles for a New Political Debate

Politics in America are polarized and trivialized, perhaps as never before. In Congress, the media, and academic debate, opponents from right and left, the Red and the Blue, struggle against one another as if politics were contact sports played to the shouts of cheerleaders. The result, Ronald Dworkin writes, is a deeply depressing political...

Channel Coding Techniques for Wireless Communications
Channel Coding Techniques for Wireless Communications

The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, Reed Solomon (RS) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with...

Defects and Deterioration in Buildings: A Practical Guide To The Science Of Material Failure
Defects and Deterioration in Buildings: A Practical Guide To The Science Of Material Failure
A good starting point to develop a sound understanding of those building problems that they will frequently encounter. Journal of Architectural Conservation July 2001

'All readers will likely learn a thing or two from this book' -Suzann D.Turner, APT Bulletin

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy