Python Forensics

Titre : Python Forensics
Auteur : Chet Hosmer
Éditeur : Elsevier
ISBN-13 : 9780124186835
Libération : 2014-05-19

Télécharger Lire en ligne



Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems Provides hands-on tools, code samples, and detailed instruction and documentation that can be put to use immediately Discusses how to create a Python forensics workbench Covers effective forensic searching and indexing using Python Shows how to use Python to examine mobile device operating systems: iOS, Android, and Windows 8 Presents complete coverage of how to use Python scripts for network investigation

Violent Python

Titre : Violent Python
Auteur : TJ O'Connor
Éditeur : Newnes
ISBN-13 : 9781597499644
Libération : 2012-12-28

Télécharger Lire en ligne



Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices Data-mine popular social media websites and evade modern anti-virus

Gray Hat Python

Titre : Gray Hat Python
Auteur : Justin Seitz
Éditeur : No Starch Press
ISBN-13 : 9781593271923
Libération : 2009

Télécharger Lire en ligne



"Gray Hat Python," the first Python book written for advanced security analysts, explains the intricacies of using Python to assist in a range of security analysis tasks.

Metasploit

Titre : Metasploit
Auteur : Jim O'Gorman
Éditeur : No Starch Press
ISBN-13 : 9781593272883
Libération : 2011

Télécharger Lire en ligne



"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--

The Defender s Dilemma

Titre : The Defender s Dilemma
Auteur : Martin C. Libicki
Éditeur : Rand Corporation
ISBN-13 : 9780833089113
Libération : 2015-06-10

Télécharger Lire en ligne



This report, the second in a series, reveals insights from chief information security officers; examines network defense measures and attacker-created countermeasures; and explores software vulnerabilities and inherent weaknesses.

Easy Oracle SQL

Titre : Easy Oracle SQL
Auteur : John Garmany
Éditeur : Rampant TechPress
ISBN-13 : 9780972751377
Libération : 2005

Télécharger Lire en ligne



Provides information on extracting Oracle data to create and format reports.

Mao in the Boardroom

Titre : Mao in the Boardroom
Auteur : Gabriel Stricker
Éditeur : St. Martin's Griffin
ISBN-13 : 9781429981262
Libération : 2003-06-28

Télécharger Lire en ligne



Steve Jobs, Richard Branson, and Ben and Jerry may think they were the first guerrilla marketers, but Mao beat them to the punch years ago. Get ready for the lessons of success from the original "Chairman" of the board. Mao in the Boardroom is the new Little Red Book for a capitalist world.

Professional Microsoft SQL Server 2014 Administration

Titre : Professional Microsoft SQL Server 2014 Administration
Auteur : Adam Jorgensen
Éditeur : John Wiley & Sons
ISBN-13 : 9781118859193
Libération : 2014-09-08

Télécharger Lire en ligne



Learn to take advantage of the opportunities offered by SQL Server 2014 Microsoft's SQL Server 2014 update means big changes for database administrators, and you need to get up to speed quickly because your methods, workflow, and favorite techniques will be different from here on out. The update's enhanced support of large-scale enterprise databases and significant price advantage mean that SQL Server 2014 will become even more widely adopted across the industry. The update includes new backup and recovery tools, new AlwaysOn features, and enhanced cloud capabilities. In-memory OLTP, Buffer Pool Extensions for SSDs, and a new Cardinality Estimator can improve functionality and smooth out the workflow, but only if you understand their full capabilities. Professional Microsoft SQL Server 2014 is your comprehensive guide to working with the new environment. Authors Adam Jorgensen, Bradley Ball, Ross LoForte, Steven Wort, and Brian Knight are the dream team of the SQL Server community, and they put their expertise to work guiding you through the changes. Improve oversight with better management and monitoring Protect your work with enhanced security features Upgrade performance tuning, scaling, replication, and clustering Learn new options for backup and recovery Professional Microsoft SQL Server 2014 includes a companion website with sample code and efficient automation utilities, plus a host of tips, tricks, and workarounds that will make your job as a DBA or database architect much easier. Stop getting frustrated with administrative issues and start taking control. Professional Microsoft SQL Server 2014 is your roadmap to mastering the update and creating solutions that work.

Arduino A Quick Start Guide

Titre : Arduino A Quick Start Guide
Auteur : Maik Schmidt
Éditeur : Pragmatic Bookshelf
ISBN-13 : 1941222242
Libération : 2015-01-29

Télécharger Lire en ligne



Presents an introduction to the open-source electronics prototyping platform.