官术网_书友最值得收藏!

Preface

Today, information technology is a part of almost everything that surrounds us. These are the systems that we wear and that support us in building and running cities, companies, our personal online shopping tours, and our friendships. These systems are attractive to use—and abuse. Consequently, all criminal fields such as theft, fraud, blackmailing, and so on expanded to the IT. Nowadays, this is a multi-billion, criminal, global shadow industry.

Can a single person spot traces of criminal or suspicious activity conducted by a multi-billion, criminal, global shadow industry? Well, sometimes you can. To analyze the modern crime, you do not need magnifying glasses and lifting fingerprints off wine bottles. Instead, we will see how to apply your Python skills to get a close look at the most promising spots on a file system and take digital fingerprints from the traces left behind by hackers.

As authors, we believe in the strength of examples over dusty theory. This is why we provide samples for forensic tooling and scripts, which are short enough to be understood by the average Python programmer, yet usable tools and building blocks for real-world IT forensics.

Are you ready to turn suspicion into hard facts?

主站蜘蛛池模板: 广宗县| 泰来县| 郑州市| 江源县| 吴江市| 沈阳市| 呼玛县| 深水埗区| 青河县| 新丰县| 霍林郭勒市| 勃利县| 平遥县| 青河县| 绥宁县| 竹溪县| 昆山市| 黄平县| 辉县市| 武平县| 顺平县| 梁平县| 冀州市| 内乡县| 祥云县| 邹城市| 沙洋县| 廉江市| 墨竹工卡县| 安新县| 涞源县| 浮山县| 大连市| 靖江市| 长沙县| 和静县| 西藏| 北安市| 旌德县| 太湖县| 西宁市|