PowerShell and Python Together - Chet Hosmer

PowerShell and Python Together (eBook)

Targeting Digital Investigations

(Autor)

eBook Download: PDF
2019 | 1st ed.
XVI, 216 Seiten
Apress (Verlag)
978-1-4842-4504-0 (ISBN)
Systemvoraussetzungen
46,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.

PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.


What You'll Learn

  • Leverage the internals of PowerShell for: digital investigation, incident response, and forensics
  • Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities
  • Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise


Who This Book Is For

System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses



Chet Hosmer is the founder of Python Forensics, Inc., a non-profit organization focused on the collaborative development of open source investigative technologies using Python and other popular scripting languages. He has been researching and developing technology and training surrounding forensics, digital investigation, and steganography for decades. He has made numerous appearances to discuss emerging cyber threats, including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics with IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine.

Chet is the author of six recent books: Defending IoT Infrastructures with the Raspberry Pi (Apress), Passive Python Network Mapping, Python Forensics, Integrating Python with Leading Computer Forensic Platforms, Data Hiding (co-authored with Mike Raggo), Executing Windows Command Line Investigation (co-authored with Joshua Bartolomie and Rosanne Pelli).

Chet serves as a visiting professor at Utica College in the cybersecurity graduate program where his research and teaching focus on advanced steganography/data hiding methods and the latest active cyber defense methods and techniques. He also is an adjunct professor at Champlain College, where his research and teaching focus is on applying Python and other scripting languages to solve challenging problems in digital investigation and forensics.

Chet resides on the Grand Strand of South Carolina with his wife Janet, son Matthew, two Labrador retrievers (Bailey and Vinny), and feline tenants Lucy, Sasha, and Evander.


Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll LearnLeverage the internals of PowerShell for: digital investigation, incident response, and forensicsLeverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilitiesCreate combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterpriseWho This Book Is ForSystem administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses

Chet Hosmer is the founder of Python Forensics, Inc., a non-profit organization focused on the collaborative development of open source investigative technologies using Python and other popular scripting languages. He has been researching and developing technology and training surrounding forensics, digital investigation, and steganography for decades. He has made numerous appearances to discuss emerging cyber threats, including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics with IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine.Chet is the author of six recent books: Defending IoT Infrastructures with the Raspberry Pi (Apress), Passive Python Network Mapping, Python Forensics, Integrating Python with Leading Computer Forensic Platforms, Data Hiding (co-authored with Mike Raggo), Executing Windows Command Line Investigation (co-authored with Joshua Bartolomie and Rosanne Pelli).Chet serves as a visiting professor at Utica College in the cybersecurity graduate program where his research and teaching focus on advanced steganography/data hiding methods and the latest active cyber defense methods and techniques. He also is an adjunct professor at Champlain College, where his research and teaching focus is on applying Python and other scripting languages to solve challenging problems in digital investigation and forensics.Chet resides on the Grand Strand of South Carolina with his wife Janet, son Matthew, two Labrador retrievers (Bailey and Vinny), and feline tenants Lucy, Sasha, and Evander.

Erscheint lt. Verlag 30.3.2019
Zusatzinfo XVI, 216 p. 91 illus.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Schlagworte Application Design • Chet Hosmer • Code Walk-Through • cybersecurity • Digital investigation • E-Discovery • Forensics • Incident Response • IT Automation • PowerShell • PowerShell Applications • PowerShell Log Analysis Analytics • Python • Python Powershell language • software development
ISBN-10 1-4842-4504-0 / 1484245040
ISBN-13 978-1-4842-4504-0 / 9781484245040
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 10,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99