컴퓨터/IT 개발/프로그래밍 , 컴퓨터/IT IT 해외원서
Mastering Python for Networking and Security Second Edition
소장 | 전자책 정가 | 22,000원 |
---|---|---|
판매가 | 22,000원 |
- 출간 정보
- 2021.01.04. 전자책 출간
- 파일 정보
- 7.1MB
- 539쪽
- ISBN
- 9781839216213
- ECN
- -
리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기
컴퓨터/IT 개발/프로그래밍 , 컴퓨터/IT IT 해외원서
소장 | 전자책 정가 | 22,000원 |
---|---|---|
판매가 | 22,000원 |
<Mastering Python for Networking and Security Second Edition> Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapy
▶Book Description
It's now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats.
Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment.
This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You'll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you'll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you'll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts.
By the end of this Python book, you'll be able to use Python to build secure apps using cryptography and steganography techniques.
▶What You Will Learn
-Create scripts in Python to automate security and pentesting tasks
-Explore Python programming tools that are used in network security processes
-Automate tasks such as analyzing and extracting information from servers
-Understand how to detect server vulnerabilities and analyze security modules
-Discover ways to connect to and get information from the Tor network
-Focus on how to extract information with Python forensics tools
▶Key Features
-Enhance your Python programming skills in securing systems and executing networking tasks
-Explore Python scripts to debug and secure complex networks
-Learn to avoid common cyber events with modern Python scripting
▶Who This Book Is For
This Python network security book is for network engineers, system administrators, or any security professional looking to overcome networking and security challenges. You will also find this book useful if you're a programmer with prior experience in Python. A basic understanding of general programming structures and the Python programming language is required before getting started.
▶What this book covers
- Chapter 1, Working with Python Scripting, introduces you to the Python language, object-oriented programming, data structures, exceptions, managing dependencies for developing with Python, and development environments.
- Chapter 2, System Programming Packages, teaches you about the main Python modules for system programming, looking at topics including reading and writing files, threads, sockets, multithreading, and concurrency.
- Chapter 3, Socket Programming, provides you with some basics of Python networking using the socket module. This module exposes all of the necessary pieces to quickly write TCP and UDP clients, as well as servers for writing low-level network applications.
- Chapter 4, HTTP Programming, covers the HTTP protocol and the main Python modules, such as the urllib standard library, and the requests and httpx modules to retrieve and manipulate web content. We also cover HTTP authentication mechanisms and how we can manage them with the requests module.
- Chapter 5, Connecting to the Tor Network and Discovering Hidden Services, explains how Tor can assist us in the research and development of tools from an anonymity and privacy point of view. In addition, we will review how to extract information from hidden services using Python modules.
- Chapter 6, Gathering Information from Servers, explores the modules that allow the extraction of information that servers are exposing publicly, such as Shodan and Binary Edge. We will also look at getting server banners and information on DNS servers and introduce you to fuzzy processing using the pywebfuzz module.
- Chapter 7, Interacting with FTP, SFTP, and SSH Servers, details the Python modules that allow us to interact with FTP, SFTP, and SSH servers, checking the security in SSH servers with the ssh-audit tool. Also, we will learn how to implement SSH clients and servers with the asyncSSH and asyncio modules.
- Chapter 8, Working with Nmap Scanner, introduces Nmap as a port scanner and covers how to implement network scanning with Python and Nmap to gather information on a network, a specific host, and the services that are running on that host. Also, we cover how to find possible vulnerabilities in a given network with Nmap scripts.
- Chapter 9, Interacting with Vulnerability Scanner, gets into Nessus and OpenVAS as vulnerability scanners and gives you reporting tools for the main vulnerabilities that can be found in servers and web applications with them. Also, we cover how to use them programmatically from Python, with the nessrest and Python-gmv modules.
- Chapter 10, Identifying Server Vulnerabilities in Web Applications, covers the main vulnerabilities in web applications with OWASP methodology and the tools we can find in the Python ecosystem for vulnerability scanning in CMS and web applications, such as sqlmap. We will also cover testing openSSL/TLS vulnerabilities in servers with the sslyze module.
- Chapter 11, Security and Vulnerabilities in Python Modules, covers security and vulnerabilities in Python modules. Also, we cover the review of Python tools such as Bandit as a static code analyzer for detecting vulnerabilities and Python best practices from a security perspective.
- Chapter 12, Python Tools for Forensics Analysis, covers the main tools we have in Python for extracting information from memory, sqlite databases, research about network forensics with PcapXray, getting information from the Windows registry, and using the logging module to register errors and debug Python scripts.
- Chapter 13, Extracting Geolocation and Metadata from Documents, Images, and Browsers, explores the main modules we have in Python for extracting information about geolocation and metadata from images and documents, identifying web technologies, and extracting metadata from Chrome and Firefox browsers.
- Chapter 14, Cryptography and Steganography, covers the main modules we have in Python for encrypting and decrypting information, such as pycryptodome and cryptography. Also, we cover steganography techniques and how to hide information in images with stepic modules. Finally, we will cover Python modules for generating keys securely with the secrets and hashlib modules.
▶ Preface
Recently, Python has started to gain a lot of traction, with the latest updates of Python adding numerous packages that can be used to perform critical missions. Our main goal with this book is to help you leverage Python packages to detect vulnerabilities and take care of networking challenges.
This book will start by walking you through the scripts and libraries of Python that are related to networking and security. You will then dive deep into core networking tasks and learn how to take care of networking challenges. Later, this book will teach you how to write security scripts to detect vulnerabilities in your network or website. By the end of this book, you will have learned how to achieve endpoint protection by leveraging Python packages, along with how to extract metadata from documents and how to write forensics and cryptography scripts.
▶About the Author
- Jose Manuel Ortega
Jose Manuel Ortega has been working as a Software Engineer and Security Researcher with focus on new technologies, open source, security and testing. His career target has been to specialize in Python and DevOps security projects with Docker. Currently he is working as a security tester engineer and his functions in the project are analysis and testing the security of applications both web and mobile environments.
He has collaborated with universities and with the official college of computer engineers presenting articles and holding some conferences. He has also been a speaker at various conferences both national and international and is very enthusiastic to learn about new technologies and loves to share his knowledge with the developers community.
▶TABLE of CONTENTS
▷Section 1: The Python Environment and System Programming Tools
-Chapter 1: Working with Python Scripting
-Chapter 2: System Programming Packages
▷Section 2: Network Scripting and Extracting Information from the Tor Network with Python
-Chapter 3: Socket Programming
-Chapter 4: HTTP Programming
-Chapter 5: Connecting to the Tor Network and Discovering Hidden Services
▷Section 3: Server Scripting and Port Scanning with Python
-Chapter 6: Gathering Information from Servers
-Chapter 7: Interacting with FTP, SFTP, and SSH Servers
-Chapter 8: Working with Nmap Scanner
▷Section 4: Server Vulnerabilities and Security in Python Modules
-Chapter 9: Interacting with Vulnerability Scanners
-Chapter 10: Identifying Server Vulnerabilities in Web Applications
-Chapter 11: Security and Vulnerabilities in Python Modules
▷Section 5: Python Forensics
-Chapter 12: Python Tools for Forensics Analysis
-Chapter 13: Extracting Geolocation and Metadata from Documents, Images, and Browsers
-Chapter 14: Cryptography and Steganography
Assessments
0.0 점
0명이 평가함
내가 남긴 별점 0.0
별로예요
그저 그래요
보통이에요
좋아요
최고예요
'구매자' 표시는 리디에서 유료도서 결제 후 다운로드 하시거나 리디셀렉트 도서를 다운로드하신 경우에만 표시됩니다.
성인 인증 안내
성인 재인증 안내
청소년보호법에 따라 성인 인증은 1년간
유효하며, 기간이 만료되어 재인증이 필요합니다.
성인 인증 후에 이용해 주세요.
해당 작품은 성인 인증 후 보실 수 있습니다.
성인 인증 후에 이용해 주세요.
청소년보호법에 따라 성인 인증은 1년간
유효하며, 기간이 만료되어 재인증이 필요합니다.
성인 인증 후에 이용해 주세요.
해당 작품은 성인 인증 후 선물하실 수 있습니다.
성인 인증 후에 이용해 주세요.
본문 끝 최상단으로 돌아가기
무료이용권을 사용하시겠습니까?
사용 가능 : 장
<>부터 총 화
무료이용권으로 대여합니다.
무료이용권으로
총 화 대여 완료했습니다.
남은 작품 : 총 화 (원)
Mastering Python for Networking and Security Second Edition
작품 제목
대여 기간 : 일
작품 제목
결제 금액 : 원
결제 가능한 리디캐시, 포인트가 없습니다.
리디캐시를 충전하시면 자동으로 결제됩니다.
최대 5% 리디포인트 적립 혜택도 놓치지 마세요!
이미 구매한 작품입니다.
작품 제목
원하는 결제 방법을 선택해주세요.
작품 제목
대여 기간이 만료되었습니다.
다음화를 보시겠습니까?