menu
{ "item_title" : "Linux Security Scripting Techniques", "item_author" : [" Reginald G. Watford "], "item_description" : "Are you ready to transform Linux from just a system you use into a powerful security engine you control?Linux Security Scripting Techniques is a practical, hands-on guide for anyone who wants to harness the full potential of Bash and Python to automate security. Whether you're a system administrator, ethical hacker, cybersecurity student, or IT professional, this book takes you step by step through building real-world defense scripts-from isolating compromised accounts to automating compliance benchmarks.Inside, you'll learn how to:Create incident response playbooks with Linux scriptsAutomate system lockdowns during active attacksBuild hybrid Bash + Python workflows for layered defenseCapture and analyze packets to detect hidden anomaliesIntegrate threat intelligence feeds for automatic blacklistingGenerate audit-ready reports that align with CIS and NIST standardsNo fluff. No filler. Just battle-tested scripts and workflows that you can customize to your own environment.If you want to move beyond theory and start building your own security automation toolkit, this book is your guide.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/826/391/9798263911362_b.jpg", "price_data" : { "retail_price" : "29.97", "online_price" : "29.97", "our_price" : "29.97", "club_price" : "29.97", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Linux Security Scripting Techniques|Reginald G. Watford

Linux Security Scripting Techniques : Automating Penetration Testing, Ethical Hacking, and Defense with Bash & Python

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Are you ready to transform Linux from just a system you use into a powerful security engine you control?

Linux Security Scripting Techniques is a practical, hands-on guide for anyone who wants to harness the full potential of Bash and Python to automate security. Whether you're a system administrator, ethical hacker, cybersecurity student, or IT professional, this book takes you step by step through building real-world defense scripts-from isolating compromised accounts to automating compliance benchmarks.

Inside, you'll learn how to:

  • Create incident response playbooks with Linux scripts
  • Automate system lockdowns during active attacks
  • Build hybrid Bash + Python workflows for layered defense
  • Capture and analyze packets to detect hidden anomalies
  • Integrate threat intelligence feeds for automatic blacklisting
  • Generate audit-ready reports that align with CIS and NIST standards

No fluff. No filler. Just battle-tested scripts and workflows that you can customize to your own environment.

If you want to move beyond theory and start building your own security automation toolkit, this book is your guide.

This item is Non-Returnable

Details

  • ISBN-13: 9798263911362
  • ISBN-10: 9798263911362
  • Publisher: Independently Published
  • Publish Date: September 2025
  • Dimensions: 11 x 8.5 x 0.77 inches
  • Shipping Weight: 1.91 pounds
  • Page Count: 374

Related Categories

You May Also Like...

    1

BAM Customer Reviews