Key Features
Book Description
Python is used for a lot of applications, ranging from building web applications and enterprise application to the world of big data. With everyday attacks on applications by hackers, securing applications has become a critical component for Python developers.
Starting with the basics to ensure the fundamentals required for security, you will gradually move on to automating various web application attacks, which can then be used by security engineers to perform automated tests. You will mitigate various application security vulnerabilities and explore the defense mechanisms available for developers in Python. You will then learn about the various phases of network security testing that can be automated and how an engineer can simulate various attacks in controlled manner to scan for vulnerabilities. Next, you will learn how to automate password cracking using Python and focus on fuzzing, a key concept of exploit writing and protocol analysis.
After reading this book, you will be able to secure your programs and applications and be ready for any kind of spyware and malware.
What you will learn
"synopsis" may belong to another edition of this title.
Tamaghna Basu, co-founder of www.weekendsecurity.org, is a security researcher at heart and his main areas of research include web app security and network pen-testing, exploit development, incident handling, and cyber forensics. Tamaghna has more than 10 years of experience in security and development.
He has been working in Python and other languages extensively for security testing, automation, and to build frameworks for enterprises. He has also created a Python-based plugin for the Ironwasp security scanning tool. He was the winner of Nullcon 2010's hacking challenge. He also presented at Cocon - International Security Conference, 2010.
He has achieved various certifications including GCIH, RHCE, CEH, ECSA, CCI, and DCL. He also works as an "Internet Safety Advocate" for WHOA, a voluntary organization who aim to prevent online abuse and cyber stalking.
"About this title" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want