Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions.
Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps.
Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to:
"synopsis" may belong to another edition of this title.
Chet makes numerous appearances each year to discuss emerging cyber threats including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, NHK Japan and ABC News Australia. He is also a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, DFI News and Wired Magazine.
He is the author of three recent Elsevier/Syngress Books: Python Passive Network Mapping: ISBN-13: 978-0128027219, Python Forensics: ISBN-13: 978-0124186767 and Data Hiding which is co/authored with Mike Raggo: ISBN-13: 978-1597497435. Chet delivers keynote and plenary talks on various cyber security related topics around the world each year.
"Covering a panoply of techniques from search to network forensics, reading this book will expand the reader’s understanding of both forensics and the Python libraries." --Computing Reviews, December 2014
"Overall, the book is well laid out. The first few chapters cover some important forensic challenges. The code is easy to follow and well commented." --Help Net Security, December 2014
"About this title" may belong to another edition of this title.
Shipping:
US$ 2.64
Within U.S.A.
Book Description Condition: New. Seller Inventory # 21013860-n
Book Description Paperback. Condition: New. Seller Inventory # 6666-ELS-9780124186767
Book Description Condition: new. Questo è un articolo print on demand. Seller Inventory # 4e131e8d2332685c4b75e1b1e7a3f9c9
Book Description Paperback. Condition: Brand New. 608 pages. 9.25x7.50x0.75 inches. In Stock. Seller Inventory # __0124186769
Book Description Condition: New. pp. 348. Seller Inventory # 26134668695
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0124186769
Book Description Condition: new. Seller Inventory # FrontCover0124186769
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0124186769
Book Description Paperback. Condition: new. Buy for Great customer experience. Seller Inventory # GoldenDragon0124186769
Book Description Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9780124186767