Mastering python for networking and security : (Record no. 885)

MARC details
000 -LEADER
fixed length control field 03550nam a2200325 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220209080823.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210824s2020 enka|||| |||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781839217166
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaTKH
Language of cataloging eng
Transcribing agency EG-CaTKH
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 OR.M 2020
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ortega, José Manuel,
Relator term author.
245 10 - TITLE STATEMENT
Title Mastering python for networking and security :
Remainder of title leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues /
Statement of responsibility, etc. José Manuel Ortega.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 515 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
Materials specified txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Section 1: The Python environment and system programming tools. 1. Working with Python scripting -- 2. System programming packages -- Section 2: Network scripting and extracting information from the Tor Network with Python. 3. Socket programming -- 4. HTTP programming -- 5. Connecting to the Tor Network and discovering hidden services -- Section 3: Server scripting and port scanning with Python. 6. Gathering information from servers -- 7. Interacting with FTP, SFTP, and SSH servers -- 8. Working with Nmap scanner -- Section 4: Server vulnerabilities and security in Python modules. 9. Interacting with vulnerability scanners -- 10. Identifying server vulnerabilities in web applications -- 11. Security and vulnerabilities in Python modules -- Section 5: Python forensics. 12. Python tools for forensics analysis -- 13. Extracting geolocation and metadata from documents, images, and browsers -- 14. Cryptography and steganography.
520 ## - SUMMARY, ETC.
Summary, etc. It's now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches cccan occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasts, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment. This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You'll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you'll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you'll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts. By the end of this Python book, you'll be able to use Python to build secure apps using cryptographies steganography techniques.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Python (Computer program language)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element HTTP (Computer network protocol)
General subdivision Programming.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name huda.mahmoud
Cataloging process M
First Date, FD (RLIN) 20220125
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham :
Name of publisher, distributor, etc. Packt Publishing
Date of publication, distribution, etc. 2021
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Date last checked out
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/24/2021 628.50   005.8 OR.M 2020 210074 08/24/2021 628.50 08/24/2021 Books  
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/25/2021 628.50 1 005.8 OR.M 2020 210075 04/21/2022 628.50 08/25/2021 Books 03/24/2022