PowerShell and Python Together: Targeting Digital Investigations
English | May 29th, 2019 | ISBN: 1484245032 | 232 Pages | EPUB (True/Retail Copy) | 9.24 MB
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.
PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.
What You'll Learn
Leverage the internals of PowerShell for: digital investigation, incident response, and forensics
Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities
Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise
Who This Book Is For
System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses
Download:
http://longfiles.com/id7pyc4pwnt4/PowerShell_and_Python_Together_Targeting_Digital_Investigations.epub.html
[Fast Download] PowerShell and Python Together: Targeting Digital Investigations
Gun Digest Shooter's Guide to Shotguns
Gun Digest Shooter's Guide to Rifle Marksmanship
Master Nmap for Scanning & Security Auditing 2019 (NSE)
Managing Energy Security : An All Hazards Approach to Critical Infrastructure
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
Blueprint for Business Safety and Security: A Guide to Protecting Your Business
Pathology of Learning in Cyber Space: Concepts, Structures and Processes
Information and Communications Security
Take Control of Your Passwords, 3rd Edition
Deploying Microsoft Forefront Protection 2010 for Exchange Server
Physical and Logical Security Convergence: Powered By Enterprise Security Manage
Hacking Exposed: Linux, 3 Ed
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Linux Basics for Hackers: Getting Started (2747)
Tribe of Hackers: Cybersecurity Advice fro(2418)
Digital Forensics Basics: A Practical Guid(2320)
Kali Linux: An Ethical Hacker's Cookbook, (2254)
Cybersecurity - Attack and Defense Strateg(2135)
Computer Security: Art and Science, 2nd Ed(2071)
Hacker's Manual - April 2019(2062)
The Wireshark Field Guide(1980)
TIME Cybersecurity: Hacking, the Dark Web (1948)
Cracking Complexity: The Breakthrough Form(1866)
The Web Application Hacker's Handbook, 2 e(1681)
Practical Security: Simple Practices for D(1669)
CEH Certified Ethical Hacker Bundle(1635)
Hands-On Cybersecurity for Finance(1627)
