- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 170字
- 2021-08-20 10:17:08
Summary
This chapter continued from where we left off in previous chapter, and helped us build a solid Python foundation for later chapters. We covered advanced data types and object-oriented programming, developed our first scripts, and dived into traceback messages. At this point, you should start to become comfortable with Python, though repeat these two chapters and manually type out the code to help strengthen your comfort level as needed. We highly recommend to practice and experiment by either testing out ideas in the interactive prompt or modifying the scripts we developed. The code for this project can be downloaded from GitHub or Packt, as described in the Preface.
As we move away from theory and look into the core part of this book, we will start with simple scripts and work toward increasingly more complicated programs. This should allow a natural development of understanding programming and skills. In the next chapter, you will learn how to parse the setupapi.dev.log file on Windows systems to identify USB installation times.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- DevSecOps敏捷安全
- Learning Python for Forensics
- 網(wǎng)絡(luò)安全保障能力研究
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 工業(yè)物聯(lián)網(wǎng)安全
- Learning Veeam? Backup & Replication for VMware vSphere
- 防火墻技術(shù)與應(yīng)用(第2版)
- 局域網(wǎng)交換機(jī)安全
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- Instant Java Password and Authentication Security
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 華為防火墻實(shí)戰(zhàn)指南
- 博弈論與數(shù)據(jù)安全
- Bug Bounty Hunting Essentials