Publicado 2015
Tabla de Contenidos:
“…Analyzing file meta informationUnderstanding inode; Reading basic file metadata with Python; Evaluating POSIX ACLs with Python; Reading file capabilities with Python; Clustering file information; Creating histograms; Advanced histogram techniques; Summary; Chapter 4: Using Python for Network Forensics; Using Dshell during an investigation; Using Scapy during an investigation; Summary; Chapter 5: Using Python for Virtualization Forensics; Considering virtualization as a new attack surface; Virtualization as an additional layer of
abstraction; Creation of rogue machines; Cloning of systems…”
Número de Clasificación:
Cargando…
Ubicado:
Cargando…
Libro electrónico
Cargando…