Narrow your search

Library

VUB (6)

KU Leuven (5)

LUCA School of Arts (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

UGent (5)

ULiège (5)

Vlerick Business School (5)

More...

Resource type

book (6)


Language

English (6)


Year
From To Submit

2019 (1)

2017 (1)

2016 (1)

2015 (1)

2014 (1)

More...
Listing 1 - 6 of 6
Sort by

Book
Integrating Python with leading computer forensics platforms
Author:
ISBN: 012809950X 0128099496 9780128099506 9780128099490 Year: 2017 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms. Provides hands-on tools, code samples, detailed instruction, and documentation that can be immediately put to use Shows how to integrate Python with popular digital forensic platforms, including EnCase, MPE+, The Open Source Autopsy/SleuthKit, and US-LATT Presents complete coverage of how to use Open Source Python scripts to extend and modify popular digital forensic Platforms


Book
Python passive network mapping : P2NMAP
Authors: ---
ISBN: 0128027428 0128027215 9780128027424 9780128027219 9780128027219 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important


Book
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices, and network protocols
Authors: ---
ISBN: 1283806053 159749741X 1597497436 9781597497411 9781597497435 Year: 2013 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, government and military personnel wi


Book
PowerShell and Python Together
Authors: ---
ISBN: 9781484245040 Year: 2019 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Python forensics : a workbench for inventing and sharing digital forensic technology
Authors: --- --- ---
ISBN: 0124186831 0124186769 1306820545 9780124186835 9781306820547 9780124186767 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile


Book
Executing windows command line investigations : while ensuring evidentiary integrity
Authors: --- --- ---
ISBN: 0128092718 0128092688 9780128092712 9780128092682 Year: 2016 Publisher: Amsterdam, [Netherlands] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response. Includes a free download of the Proactive Incident Response Command Shell (PIRCS) software Learn about the technical details of Windows CLI so you can directly manage every aspect of incident response evidence acquisition and triage, while maintaining evidentiary integrity

Listing 1 - 6 of 6
Sort by