- Security with Go
- John Daniel Leon
- 437字
- 2021-06-30 19:06:36
Preface
This book covers the Go programming language and explains how to apply it in the cybersecurity industry. The topics covered are useful for red and blue teams, as well as for developers who want to write secure code, and for networking and operations engineers who want to secure their networks, hosts, and intellectual property. The source code examples are all fully functional programs. The examples are intended to be practical applications that you will likely want to incorporate into your own toolkit. Moreover, this book serves as a practical cookbook for building your own custom applications. I have also shared other security best practices and tricks that I learned.
This book will walk you through examples of code that are useful in a variety of computer security situations. As you work through the book, you will build a cookbook of practical applications and building blocks to use in your own security tools for use in your organization and engagements. It will also cover some tips and trivia regarding the Go programming language and provide many useful reference programs to boost your own Go cookbook.
This book will cover several blue team and red team use cases and various other security-related topics. Blue team topics, namely steganography, forensics, packet capturing, honeypots, and cryptography, and red team topics, namely brute forcing, port scanning, bind and reverse shells, SSH clients, and web scraping, will be covered. Each chapter relates to a different security topic and walks through code examples pertaining to that topic. If you follow this book, you will have a cookbook full of useful security tools and building blocks to create your own custom tools all in Go.
This book is not an in-depth tutorial on using the Go language. One chapter is dedicated to explaining Go; however, it only scratches the surface as compared to Alan Donovan and Brian Kernighan's almost 400-page The Go Programming Language. Fortunately, Go is a very easy language to pick up and has a quick learning curve. Some resources on learning Go are provided, but the reader may need to do some supplemental reading if not familiar with Go.
This book will not explore cutting-edge security techniques or vulnerabilities that are not already well documented. There are no zero-days or grand techniques unveiled. Each chapter is dedicated to a different security topic. Each one of these topics could have a book written about them. There are experts who specialize in each of these fields, so the book does not go in depth on any particular topic. The reader will have a solid foundation to explore any topic deeper when complete.
- 走進奇妙的數(shù)學(xué)世界(小學(xué)一二年級)
- 西去東來:沿絲綢之路數(shù)學(xué)知識的傳播與交流
- 蟻群智能優(yōu)化方法及其應(yīng)用
- 尖叫的數(shù)學(xué):令人驚嘆的數(shù)學(xué)之美
- 我的第一本趣味數(shù)學(xué)書2
- 數(shù)學(xué)實驗教程
- 其實你對數(shù)學(xué)的誤會很大(共5冊)
- 數(shù)學(xué)教學(xué)論
- 神機妙算:一本關(guān)于算法的閑書
- 這才是好讀的數(shù)學(xué)史
- 線性代數(shù)
- 數(shù)學(xué)思維的力量
- 別萊利曼的趣味代數(shù)學(xué)
- 數(shù)書九章
- 文化偉人代表作圖釋書系:九章算術(shù)