
At a Glance
ePUB
eBook
$13.99
or 4 interest-free payments of $3.50 with
Instant Digital Delivery to your Kobo Reader App
Go beyond theory and build the automated defenses that modern threats demand.
The digital battlefield has changed. Attacks are faster, more automated, and more sophisticated than ever. Relying on manual checks and off-the-shelf tools is no longer enough. To truly secure your infrastructure, you must move from a reactive posture to a proactive, automated defense—and Python is your ultimate weapon.
This volume, DEFENSIVE CYBERSECURITY WITH PYTHON PROGRAMMING, is a complete field manual for the modern guardian. Written for developers, system administrators, and security professionals, this standalone guide provides the practical skills you need to build intelligent, scalable, and automated security systems from the ground up.
INSIDE THIS VOLUME, YOU WILL MASTER THE ART OF AUTOMATED DEFENSE:
- Real-Time System Monitoring: Go beyond static logs and listen to the pulse of your systems. Use psutil to build live process auditors, service monitors, and resource analyzers to detect behavioral anomalies in real time.
- Automated File Integrity Monitoring (FIM): Create immutable cryptographic baselines with hashlib and build a persistent FIM system to instantly detect unauthorized modifications to critical system files.
- Defensive Network Analysis: Build your own safe, non-intrusive port scanners with the socket module for internal asset inventory and use scapy to hunt for the subtle fingerprints of C2 beaconing in captured traffic.
- Compliance as Code: Transform manual checklists into automated scripts. Write Python to audit system configurations against industry-standard benchmarks like the CIS (Center for Internet Security) standards.
- Building a Lightweight SIEM: Master log parsing with Regular Expressions and pandas. Build a foundational event correlation engine to detect multi-stage attack patterns that span different log sources.
- "Shift Left" Security Automation: Integrate automated SAST, dependency vulnerability checks (SCA), and secret scanning directly into your CI/CD pipelines to create security gates that prevent vulnerable code from ever reaching production.
NEW: HARNESS THE POWER OF AI FOR ADVANCED DEFENSE
- AI-Powered Security Operations: Leverage Large Language Models (LLMs) to augment your defensive capabilities. Learn to write effective prompts to classify threats, perform semantic log analysis, and summarize complex incidents automatically.
- Automated Threat Response: Use LLMs to generate dynamic incident response playbooks and even create mitigation scripts—such as iptables rules or process termination commands—for human-in-the-loop approval.
- AI-Powered Code Auditing: Build a custom SAST tool that uses an LLM to review your Python code for common OWASP vulnerabilities, finding flaws before they are ever committed.
WHO THIS BOOK IS FOR:
This standalone guide is engineered for intermediate to advanced Python developers, System Administrators, DevOps/SRE engineers, and security analysts (Blue Team) who want to move beyond theory and build practical, automated defenses. A solid understanding of Python, networking fundamentals, and core OS concepts is required.
Stop reacting to threats. Start anticipating and automating your defense.
on
ISBN: 9798232825195
Published: 24th December 2025
Format: ePUB
Language: English
Publisher: ?Edgar Milvus
























