Have a personal or library account? Click to login
Security Automation with Ansible 2 Cover

Security Automation with Ansible 2

Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Paid access
|Sep 2025
Product purchase options

Authors

Mahajan Akash :

Akash Mahajan is an accomplished security professional with over a decade's experience in providing specialist application and infrastructure consulting services at the highest levels to companies, governments, and organizations around the world. He has lots of experience in working with clients to provide innovative security insights that truly reflect the commercial and operational needs of the organization, from strategic advice to testing and analysis to incident response and recovery. He is an active participant in the international security community and a conference speaker both individually, as chapter lead of the Bangalore chapter of OWASP the global organization responsible for defining the standards for web application security and as a co-founder of NULL India's largest open security community. Akash runs Appsecco, a company focused on Application Security. He authored the book Burp Suite Essentials published by Packt Publishing in November 2014, which is listed as a reference by the creators of Burp Suite.AKULA MADHU :

Madhu Akula is a cloud native security researcher with extensive experience in cloud, containers, Kubernetes, and automation security. He frequently speaks and trains at security conferences around the world, including DEFCON, BlackHat, USENIX, Github, OWASP Appsec, AllDayDevOps, DevSecCon, Nullcon, and c0c0n. His research has identified vulnerabilities in 200+ companies and products like Google, Microsoft, AT&T, Wordpress, Ntop, and Adobe. He is a co-author of Security Automation with Ansible 2, a book that is listed as a technical resource by Red Hat. Madhu is an active member of international security, DevOps, and CloudNative communities and holds industry certifications like OSCP and CKA.

PDF ISBN: 978-1-78839-872-5
Publisher: Packt Publishing Limited
Copyright owner: © 2017 Packt Publishing Limited
Publication date: 2025
Language: English
Pages: 364