|
![]() |
|||
|
||||
OverviewPython Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems Full Product DetailsAuthor: Chet Hosmer (President, Python Forensics, Inc.<br>Assistant Professor, University of Arizona, Arizona, USA)Publisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 19.10cm , Height: 1.80cm , Length: 23.50cm Weight: 0.730kg ISBN: 9780124186767ISBN 10: 0124186769 Pages: 352 Publication Date: 09 June 2014 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9780443222337 Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1. Why Python Forensics 2. creating a Python Forensics Workbench 3. Let’s Write Our First Python Forensics App 4. Effective Forensic Searching and Indexing using Python 5. Evidence Carving with Python 6. Timeline Evidence with Python 7. Natural Language Processing of Evidence using Python 8. Examining Mobile Device Evidence with Python 9. Log File Analysis 10. Python Scripts for Network Investigation 11. Investigating the Cloud 12. Future ExpansionReviewsCovering a panoply of techniques from search to network forensics, reading this book will expand the reader's understanding of both forensics and the Python libraries. --Computing Reviews, December 2014 Overall, the book is well laid out. The first few chapters cover some important forensic challenges. The code is easy to follow and well commented. --Help Net Security, December 2014 Covering a panoply of techniques from search to network forensics, reading this book will expand the reader's understanding of both forensics and the Python libraries. --Computing Reviews,December 09,2014 Overall, the book is well laid out. The first few chapters cover some important forensic challenges. The code is easy to follow and well commented. --Help Net Security,December 18,2014 Covering a panoply of techniques from search to network forensics, reading this book will expand the reader's understanding of both forensics and the Python libraries. --Computing Reviews,December 09,2014 Overall, the book is well laid out. The first few chapters cover some important forensic challenges. The code is easy to follow and well commented. --Help Net Security,December 18,2014 Author InformationChet Hosmer serves as an Assistant Professor of Practice at the University of Arizona in the Cyber Operations program, where he is teaching and researching the application of Python and Machine Learning to advanced cybersecurity challenges. Chet is also the founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open-source investigative technologies using Python and other popular scripting languages. Chet has made numerous appearances to discuss emerging cyber threats including NPR, ABC News, Forbes, IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine. He has 7 published books with Elsevier and Apress that focus on data hiding, passive network defense strategies, Python Forensics, PowerShell, and IoT. Tab Content 6Author Website:Countries AvailableAll regions |