MARC details
000 -LEADER |
fixed length control field |
03550nam a2200325 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220209080823.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210824s2020 enka|||| |||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781839217166 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-CaTKH |
Language of cataloging |
eng |
Transcribing agency |
EG-CaTKH |
Description conventions |
rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 OR.M 2020 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Ortega, José Manuel, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Mastering python for networking and security : |
Remainder of title |
leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues / |
Statement of responsibility, etc. |
José Manuel Ortega. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Birmingham : |
Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
Date of production, publication, distribution, manufacture, or copyright notice |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 515 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
Materials specified |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Section 1: The Python environment and system programming tools. 1. Working with Python scripting -- 2. System programming packages -- Section 2: Network scripting and extracting information from the Tor Network with Python. 3. Socket programming -- 4. HTTP programming -- 5. Connecting to the Tor Network and discovering hidden services -- Section 3: Server scripting and port scanning with Python. 6. Gathering information from servers -- 7. Interacting with FTP, SFTP, and SSH servers -- 8. Working with Nmap scanner -- Section 4: Server vulnerabilities and security in Python modules. 9. Interacting with vulnerability scanners -- 10. Identifying server vulnerabilities in web applications -- 11. Security and vulnerabilities in Python modules -- Section 5: Python forensics. 12. Python tools for forensics analysis -- 13. Extracting geolocation and metadata from documents, images, and browsers -- 14. Cryptography and steganography. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
It's now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches cccan occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasts, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment. This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You'll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you'll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you'll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts. By the end of this Python book, you'll be able to use Python to build secure apps using cryptographies steganography techniques. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Python (Computer program language) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
HTTP (Computer network protocol) |
General subdivision |
Programming. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
20220125 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Birmingham : |
Name of publisher, distributor, etc. |
Packt Publishing |
Date of publication, distribution, etc. |
2021 |