官术网_书友最值得收藏!

Preface

Today, information technology is a part of almost everything that surrounds us. These are the systems that we wear and that support us in building and running cities, companies, our personal online shopping tours, and our friendships. These systems are attractive to use—and abuse. Consequently, all criminal fields such as theft, fraud, blackmailing, and so on expanded to the IT. Nowadays, this is a multi-billion, criminal, global shadow industry.

Can a single person spot traces of criminal or suspicious activity conducted by a multi-billion, criminal, global shadow industry? Well, sometimes you can. To analyze the modern crime, you do not need magnifying glasses and lifting fingerprints off wine bottles. Instead, we will see how to apply your Python skills to get a close look at the most promising spots on a file system and take digital fingerprints from the traces left behind by hackers.

As authors, we believe in the strength of examples over dusty theory. This is why we provide samples for forensic tooling and scripts, which are short enough to be understood by the average Python programmer, yet usable tools and building blocks for real-world IT forensics.

Are you ready to turn suspicion into hard facts?

主站蜘蛛池模板: 郧西县| 南华县| 阳西县| 漾濞| 左云县| 江口县| 临沧市| 古田县| 安泽县| 潼关县| 平昌县| 湖南省| 罗城| 新化县| 琼海市| 台安县| 乌拉特后旗| 青海省| 高淳县| 阳春市| 临洮县| 玉山县| 中阳县| 清丰县| 西华县| 定安县| 三台县| 岳阳市| 岳池县| 澳门| 广南县| 龙江县| 博罗县| 永顺县| 邛崃市| 田林县| 台江县| 金山区| 达州市| 呼图壁县| 墨玉县|