|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn932247938 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151215s2015 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d DEBBG
|d DEBSZ
|d VT2
|d CEF
|d WYU
|d UAB
|d UKAHL
|d RDF
|d N$T
|d YDXIT
|d OCL
|d NLW
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1783988053
|
020 |
|
|
|a 1783988045
|
020 |
|
|
|a 9781783988044
|
020 |
|
|
|a 9781783988051
|q electronic book
|
029 |
1 |
|
|a DEBBG
|b BV043968133
|
029 |
1 |
|
|a DEBSZ
|b 485786222
|
029 |
1 |
|
|a GBVCP
|b 882747207
|
035 |
|
|
|a (OCoLC)932247938
|
037 |
|
|
|a CL0500000683
|b Safari Books Online
|
050 |
|
4 |
|a QA76.73.P98
|b S67 2015
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Spreitzenbarth, Michael,
|e author.
|
245 |
1 |
0 |
|a Mastering Python forensics :
|b master the art of digital forensics and analysis with Python /
|c Michael Spreitzenbarth, Johann Uhrmann.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Community experience distilled
|
588 |
|
|
|a Description based upon online resource; title from PDF title page (viewed May 20, 2020).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Lab and Introduction to Python ctypes; Setting up the Lab; Ubuntu; Python virtual environment (virtualenv); Introduction to Python ctypes; Working with Dynamic Link Libraries; C data types; Defining Unions and Structures; Summary; Chapter 2: Forensic Algorithms; Algorithms; MD5; SHA256; SSDEEP; Supporting the chain of custody; Creating hash sums of full disk images; Creating hash sums of directory trees; Real-world scenarios; Mobile Malware; NSRLquery
|
505 |
8 |
|
|a Downloading and installing nsrlsvrWriting a client for nsrlsvr in Python; Summary; Chapter 3: Using Python for Windows and Linux Forensics; Analyzing the Windows Event Log; The Windows Event Log; Interesting Events; Parsing the Event Log for IOC; The python-evtx parser; The plaso and log2timeline tools; Analyzing the Windows Registry; Windows Registry Structure; Parsing the Registry for IOC; Connected USB Devices; User histories; Startup programs; System Information; Shim Cache Parser; Implementing Linux specific checks; Checking the integrity of local user credentials
|
505 |
8 |
|
|a Analyzing file meta informationUnderstanding inode; Reading basic file metadata with Python; Evaluating POSIX ACLs with Python; Reading file capabilities with Python; Clustering file information; Creating histograms; Advanced histogram techniques; Summary; Chapter 4: Using Python for Network Forensics; Using Dshell during an investigation; Using Scapy during an investigation; Summary; Chapter 5: Using Python for Virtualization Forensics; Considering virtualization as a new attack surface; Virtualization as an additional layer of abstraction; Creation of rogue machines; Cloning of systems
|
505 |
8 |
|
|a Searching for misuse of virtual resourcesDetecting rogue network interfaces; Detecting direct hardware access; Using virtualization as a source of evidence; Creating forensic copies of RAM content; Using snapshots as disk images; Capturing network traffic; Summary; Chapter 6: Using Python for Mobile Forensics; The investigative model for smartphones; Android; Manual Examination; Automated Examination with the help of ADEL; Idea behind the system; Implementation and system workflow; Working with ADEL; Movement profiles; Apple iOS; Getting the Keychain from a jailbroken iDevice
|
505 |
8 |
|
|a Manual Examination with libimobiledeviceSummary; Chapter 7: Using Python for Memory Forensics; Understanding Volatility basics; Using Volatility on Android; LiME and the recovery image; Volatility for Android; Reconstructing data for Android; Call history; Keyboard cache; Using Volatility on Linux; Memory acquisition; Volatility for Linux; Reconstructing data for Linux; Analyzing processes and modules; Analyzing networking information; Malware hunting with the help of YARA; Summary; Where to go from here; Index
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Python (Computer program language)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Forensic sciences
|x Data processing.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Python (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Criminalistique
|x Informatique.
|
650 |
|
7 |
|a COMPUTERS.
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Forensic sciences
|x Data processing.
|2 fast
|0 (OCoLC)fst00932012
|
650 |
|
7 |
|a Python (Computer program language)
|2 fast
|0 (OCoLC)fst01084736
|
700 |
1 |
|
|a Uhrmann, Johann,
|e author.
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781783988044/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29507048
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1089587
|
994 |
|
|
|a 92
|b IZTAP
|