- Mastering Python Forensics
- Dr. Michael Spreitzenbarth Dr. Johann Uhrmann
- 201字
- 2021-07-09 21:11:14
Preface
Today, information technology is a part of almost everything that surrounds us. These are the systems that we wear and that support us in building and running cities, companies, our personal online shopping tours, and our friendships. These systems are attractive to use—and abuse. Consequently, all criminal fields such as theft, fraud, blackmailing, and so on expanded to the IT. Nowadays, this is a multi-billion, criminal, global shadow industry.
Can a single person spot traces of criminal or suspicious activity conducted by a multi-billion, criminal, global shadow industry? Well, sometimes you can. To analyze the modern crime, you do not need magnifying glasses and lifting fingerprints off wine bottles. Instead, we will see how to apply your Python skills to get a close look at the most promising spots on a file system and take digital fingerprints from the traces left behind by hackers.
As authors, we believe in the strength of examples over dusty theory. This is why we provide samples for forensic tooling and scripts, which are short enough to be understood by the average Python programmer, yet usable tools and building blocks for real-world IT forensics.
Are you ready to turn suspicion into hard facts?
- Spring Cloud Alibaba微服務(wù)架構(gòu)設(shè)計(jì)與開發(fā)實(shí)戰(zhàn)
- Kubernetes實(shí)戰(zhàn)
- Windows系統(tǒng)管理與服務(wù)配置
- JavaScript+jQuery開發(fā)實(shí)戰(zhàn)
- Building an RPG with Unity 2018
- The DevOps 2.5 Toolkit
- RISC-V體系結(jié)構(gòu)編程與實(shí)踐(第2版)
- Mastering Business Intelligence with MicroStrategy
- Azure Serverless Computing Cookbook
- 交互式程序設(shè)計(jì)(第2版)
- 零基礎(chǔ)學(xué)C++(升級版)
- 數(shù)據(jù)分析與挖掘算法:Python實(shí)戰(zhàn)
- Java EE架構(gòu)設(shè)計(jì)與開發(fā)實(shí)踐
- Groovy 2 Cookbook
- Python無監(jiān)督學(xué)習(xí)