|
|
|
|
LEADER |
03346nam a2200445 4500 |
001 |
978-1-4842-4504-0 |
003 |
DE-He213 |
005 |
20190619201558.0 |
007 |
cr nn 008mamaa |
008 |
190330s2019 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484245040
|9 978-1-4842-4504-0
|
024 |
7 |
|
|a 10.1007/978-1-4842-4504-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Hosmer, Chet.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a PowerShell and Python Together
|h [electronic resource] :
|b Targeting Digital Investigations /
|c by Chet Hosmer.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2019.
|
300 |
|
|
|a XVI, 216 p. 91 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Chapter 1: An Introduction to PowerShell for Investigators -- Chapter 2: PowerShell Pipelining -- Chapter 3: PowerShell Scripting Targeting Investigation -- Chapter 4: Python and Live Investigation/Acquisition -- Chapter 5: PowerShell / Python Investigation Example -- Chapter 6: Launching Python from PowerShell -- Chapter 7: Loose Ends and Future Considerations -- Appendix: Challenge Problem Solutions -- .
|
520 |
|
|
|a Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators. You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis. PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Leverage the internals of PowerShell for: digital investigation, incident response, and forensics Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Python (Computer program language).
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Python.
|0 http://scigraph.springernature.com/things/product-market-codes/I29080
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484245033
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484245057
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-4504-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|