Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perl Scripting for IT Security

Buy
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.

*Perl is the third most commonly used programming language in the world
*Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more
*The companion Web site for the book contains dozens of scripts the reader can download and use today

About the Author

Harlan Carvey developed an interest in computer security while in the military. After leaving active duty, he began working in the area of penetration testing and vulnerability assessments, leading teams of engineers, and developing his own tools to optimize his ability to collect and analyze data. As most clients employed Windows to some degree, Harlan began to see a disparity in knowledge and support for these operating systems, and decided to seize the opportunity and focus on Windows as an area of interest and research. This led him to address topics in incident response and forensic analysis, and to his position as a forensic analyst.

Harlan has been a prolific author and presenter, beginning with the Usenix LISA-NT conference in 2000. He has also presented at Black Hat, DefCon 9, MISTI, and HTCIA/GMU conferences. Harlan has had articles published in the Information Security Bulletin as well as on the SecurityFocus web site, and is the author of Windows Forensics and Incident Recovery.
(HTML tags aren't allowed.)

Complete MBA For Dummies (Business & Personal Finance)
Complete MBA For Dummies (Business & Personal Finance)
"with this friendly guide, everyone can sample the benefits of an MBA education in a fraction of the time and at much less cost" (Business a.m., 5 November 2002)

Want to get an MBA? The Complete MBA For Dummies, 2nd Edition, is the practical, plain-English guide that covers all the basics of a
...
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet

Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol.

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily...

Learning Scrapy
Learning Scrapy

Key Features

  • Extract data from any source to perform real time analytics.
  • Full of techniques and examples to help you crawl websites and extract data within hours.
  • A hands-on guide to web scraping and crawling with real-life problems and solutions

Book Description

...

Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify...
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

Rf And Baseband Techniques for Software Defined Radio
Rf And Baseband Techniques for Software Defined Radio
Software defined radio (SDR) is an emerging form of radio architecture, which
encompasses a wide range of design techniques in order to realize a truly flexible,
and potentially future-proof, transceiver system. As a field, it is very broad, encompassing:
systems design, RF, IF, and baseband analogue hardware design, digital...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy