Cargando…

Perl scripting for Windows security : live response, forensic analysis, and monitoring /

The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carvey, Harlan A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress Media, 2007.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162131599
003 OCoLC
005 20231117014907.0
006 m o d
007 cr cn|||||||||
008 070802s2007 xx o 000 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d BTCTA  |d BAKER  |d YDXCP  |d OPELS  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCF  |d OCLCQ  |d UAB  |d IDEBK  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d D6H  |d OCLCQ  |d COO  |d LEAUB  |d BRF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 148973083  |a 171555277  |a 464490567  |a 742287328 
020 |a 9781597491730  |q (paperback) 
020 |a 159749173X  |q (paperback) 
035 |a (OCoLC)162131599  |z (OCoLC)148973083  |z (OCoLC)171555277  |z (OCoLC)464490567  |z (OCoLC)742287328 
050 4 |a QA76.73.P22  |b P47 2007 
072 7 |a K  |2 bicssc 
082 0 4 |a 005.13/3  |2 22 
100 1 |a Carvey, Harlan A. 
245 1 0 |a Perl scripting for Windows security :  |b live response, forensic analysis, and monitoring /  |c Harlan Carvey. 
260 |a [Place of publication not identified] :  |b Syngress Media,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today. 
505 0 |a Penetration Testing -- Vulnerability Assessments -- Monitoring Users -- Network/Intrusion Monitoring -- Log Analysis -- Forensics. 
588 0 |a Print version record. 
650 0 |a Perl (Computer program language) 
650 0 |a Computer programming. 
650 6 |a Perl (Langage de programmation)  |0 (CaQQLa)201-0242942 
650 6 |a Programmation (Informatique)  |0 (CaQQLa)201-0002014 
650 7 |a computer programming.  |2 aat  |0 (CStmoGRI)aat300054641 
650 7 |a Computer programming  |2 fast  |0 (OCoLC)fst00872390 
650 7 |a Perl (Computer program language)  |2 fast  |0 (OCoLC)fst01058226 
776 0 8 |i Print version:  |z 9781597491730  |z 159749173X  |w (OCoLC)148973083 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597491730  |z Texto completo