top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Defending IoT Infrastructures with the Raspberry Pi : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer
Defending IoT Infrastructures with the Raspberry Pi : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer
Autore Hosmer Chet
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Descrizione fisica 1 online resource (XV, 178 p. 68 illus.)
Disciplina 005.8
Soggetto topico Data protection
Python (Computer program language)
Computer input-output equipment
Security
Python
Hardware and Maker
ISBN 1-4842-3700-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: IoT Vulnerabilities -- Chapter 2: Classifying and Modeling IoT Behavior -- Chapter 3: Raspberry Pi Configuration and PackerRecorder.py Enhancements -- Chapter 4: Raspberry Pi as a Sensor -- Chapter 5: Operating the Raspberry Pi Sensor -- Chapter 6: Adding Finishing Touches -- Chapter 7: Future Considerations -- Appendix: Obtaining the Python Source Code -- Glossary -- .
Record Nr. UNINA-9910300757203321
Hosmer Chet  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Integrating Python with leading computer forensics platforms / / Chet Hosmer
Integrating Python with leading computer forensics platforms / / Chet Hosmer
Autore Hosmer Chet
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Syngress, , 2017
Descrizione fisica 1 online resource (218 pages) : illustrations, photographs
Disciplina 005.133
Soggetto topico Python (Computer program language)
Computer crimes - Investigation
ISBN 0-12-809950-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910583303303321
Hosmer Chet  
Amsterdam, [Netherlands] : , : Syngress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PowerShell and Python Together : Targeting Digital Investigations / / by Chet Hosmer
PowerShell and Python Together : Targeting Digital Investigations / / by Chet Hosmer
Autore Hosmer Chet
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (223 pages)
Disciplina 005.282
Soggetto topico Data protection
Python (Computer program language)
Data and Information Security
Python
ISBN 1-4842-4504-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: An Introduction to PowerShell for Investigators -- Chapter 2: PowerShell Pipelining -- Chapter 3: PowerShell Scripting Targeting Investigation -- Chapter 4: Python and Live Investigation/Acquisition -- Chapter 5: PowerShell / Python Investigation Example -- Chapter 6: Launching Python from PowerShell -- Chapter 7: Loose Ends and Future Considerations -- Appendix: Challenge Problem Solutions -- .
Record Nr. UNINA-9910338004803321
Hosmer Chet  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Python forensics : a workbench for inventing and sharing digital forensic technology / / Chet Hosmer ; technical editor, Gary C. Kessler ; acquiring editor, Steve Elliot ; designer, Mark Rogers
Python forensics : a workbench for inventing and sharing digital forensic technology / / Chet Hosmer ; technical editor, Gary C. Kessler ; acquiring editor, Steve Elliot ; designer, Mark Rogers
Autore Hosmer Chet
Edizione [1st ed.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2014
Descrizione fisica 1 online resource (347 p.)
Disciplina 005.13/3
Soggetto topico Python (Computer program language)
Soggetto genere / forma Electronic books.
ISBN 0-12-418683-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology; Copyright; Dedication; Acknowledgments; Endorsements; Contents; List of figures; About the Author; About the Technical Editor; Foreword; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions, and Contributions; Chapter 1: Why Python Forensics?; Introduction; Cybercrime investigation challenges; How can the Python programming environment help meet these challenges?; Global support for Python; Open source and platform independence
Lifecycle positioningCost and barriers to entry; Python and the Daubert evidence standard; Organization of the book; Chapter review; Summary questions; Additional Resources; Chapter 2: Setting up a Python Forensics Environment; Introduction; Setting up a python forensics environment; The right environment; The Python Shell; Choosing a python version; Installing python on windows; Python packages and modules; The Python Standard Library; What is included in the standard library?; Built-in functions; hex() and bin(); range(); Other built-in functions; Built-in constants; Built-in types
Built-in exceptionsFile and directory access; Data compression and archiving; File formats; Cryptographic services; Operating system services; Standard Library summary; Third-party packages and modules; The natural language toolkit [NLTK]; Twisted matrix [TWISTED]; Integrated development environments; What are the options?; IDLE; WingIDE; Python running on Ubuntu Linux; Python on mobile devices; iOS Python app; Windows 8 phone; A virtual machine; Chapter review; Summary questions; Looking ahead; Additional Resources; Chapter 3: Our First Python Forensics App; Introduction
Naming conventions and other considerationsConstants; Local variable name; Global variable name; Functions name; Object name; Module; Class names; Our first application ``one-way file system hashing ́ ́; Background; One-way hashing algorithms basic characteristics; Popular cryptographic hash algorithms?; What are the tradeoffs between one-way hashing algorithms?; What are the best-use cases for one-way hashing algorithms in forensics?; Fundamental requirements; Design considerations; Program structure; Main function; ParseCommandLine; WalkPath function; HashFile function; CSVWriter (class)
LoggerWriting the code; Code walk-through; Examining main-code walk-through; ParseCommandLine(); ValiditingDirectoryWritable; WalkPath; HashFile; CSVWriter; Full code listing pfish.py; Full code listing _pfish.py; Results presentation; Chapter review; Summary questions; Looking ahead; Additional Resources; Chapter 4: Forensic Searching and Indexing Using Python; Introduction; Keyword context search; How can this be accomplished easily in Python?; Fundamental requirements; Design considerations; Main function; ParseCommandLine; SearchWords function; PrintBuffer functions; logger
Writing the code
Record Nr. UNISA-996426339003316
Hosmer Chet  
Waltham, Massachusetts : , : Syngress, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler
Autore Hosmer Chet
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (162 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Python (Computer program language)
Peer-to-peer architecture (Computer networks)
ISBN 0-12-802742-8
0-12-802721-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your Network
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment
Switch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis
Printing Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script
Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index
Record Nr. UNINA-9910797127603321
Hosmer Chet  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler
Autore Hosmer Chet
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (162 p.)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Python (Computer program language)
Peer-to-peer architecture (Computer networks)
ISBN 0-12-802742-8
0-12-802721-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your Network
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment
Switch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis
Printing Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script
Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index
Record Nr. UNINA-9910818992203321
Hosmer Chet  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui