Get Free Shipping on orders over $79
Python for Security and Networking : Leverage Python modules and tools in securing your network and applications, 3rd Edition - José Manuel Ortega

Python for Security and Networking

Leverage Python modules and tools in securing your network and applications, 3rd Edition

By: José Manuel Ortega

eText | 7 June 2023 | Edition Number 3

At a Glance

eText


$61.59

or 4 interest-free payments of $15.40 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application

Key Features

  • Discover security techniques to protect your network and systems using Python 3.10
  • Create scripts in Python to automate security and pentesting tasks
  • Analyze network traffic in a network and extract information using Python 3.10

Book Description

Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture.

The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts.

The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks.

By the end of this book, you will be able to make the most of Python to test the security of your network and applications.

What you will learn

  • Create scripts in Python to automate security and pentesting tasks
  • Program your own tools in Python that can be used in a Network Security process
  • Automate tasks of analysis and extraction of information from servers
  • Detect Server Vulnerabilities and analyze security in web applications
  • Utilize the ssh-audit tool to check the security in SSH servers
  • Explore WriteHat as a pentesting reports tool written in Python
  • Automate the process of detecting vulnerabilities in applications with tools like Fuxploider

Who This Book Is For

This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite.

Table of Contents

  1. Working with Python Scripting
  2. System programming packages
  3. Sockets programming
  4. HTTP Programming and web authentication
  5. Analyzing Network Traffic and Packets Sniffing
  6. Gathering information from servers with OSINT tools
  7. Interacting with FTP, SFTP and SSH Servers
  8. Working with Nmap Scanner
  9. Automating vulnerabilities scanning
  10. Identifying server vulnerabilities in web applications
  11. Obtain information from vulnerabilities database
  12. Extracting geolocation and metadata from documents, images and browsers
  13. Python tools for brute force attacks
  14. Cryptography and code obfuscation
on
Desktop
Tablet
Mobile

More in Computer Viruses

The AI of War - Nathan McGrath

eBOOK

$4.99

Cybersecurity - Phillip Ferraro

eBOOK

$15.99

Defense in Depth - Qasim

eBOOK

$39.99

Learning ParrotOS - Arvin Destar

eBOOK

Industrial Cybersecurity - Anand Shinde

eBOOK