Defending IoT Infrastructures with the Raspberry Pi : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer |
Autore | Hosmer Chet |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 |
Descrizione fisica | 1 online resource (XV, 178 p. 68 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Python (Computer program language) Computer input-output equipment Security Python Hardware and Maker |
ISBN | 1-4842-3700-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: IoT Vulnerabilities -- Chapter 2: Classifying and Modeling IoT Behavior -- Chapter 3: Raspberry Pi Configuration and PackerRecorder.py Enhancements -- Chapter 4: Raspberry Pi as a Sensor -- Chapter 5: Operating the Raspberry Pi Sensor -- Chapter 6: Adding Finishing Touches -- Chapter 7: Future Considerations -- Appendix: Obtaining the Python Source Code -- Glossary -- . |
Record Nr. | UNINA-9910300757203321 |
Hosmer Chet | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrating Python with leading computer forensics platforms / / Chet Hosmer |
Autore | Hosmer Chet |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Syngress, , 2017 |
Descrizione fisica | 1 online resource (218 pages) : illustrations, photographs |
Disciplina | 005.133 |
Soggetto topico |
Python (Computer program language)
Computer crimes - Investigation |
ISBN | 0-12-809950-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910583303303321 |
Hosmer Chet | ||
Amsterdam, [Netherlands] : , : Syngress, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PowerShell and Python Together : Targeting Digital Investigations / / by Chet Hosmer |
Autore | Hosmer Chet |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
Descrizione fisica | 1 online resource (223 pages) |
Disciplina | 005.282 |
Soggetto topico |
Data protection
Python (Computer program language) Data and Information Security Python |
ISBN | 1-4842-4504-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: An Introduction to PowerShell for Investigators -- Chapter 2: PowerShell Pipelining -- Chapter 3: PowerShell Scripting Targeting Investigation -- Chapter 4: Python and Live Investigation/Acquisition -- Chapter 5: PowerShell / Python Investigation Example -- Chapter 6: Launching Python from PowerShell -- Chapter 7: Loose Ends and Future Considerations -- Appendix: Challenge Problem Solutions -- . |
Record Nr. | UNINA-9910338004803321 |
Hosmer Chet | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Python forensics : a workbench for inventing and sharing digital forensic technology / / Chet Hosmer ; technical editor, Gary C. Kessler ; acquiring editor, Steve Elliot ; designer, Mark Rogers |
Autore | Hosmer Chet |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (347 p.) |
Disciplina | 005.13/3 |
Soggetto topico | Python (Computer program language) |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-418683-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology; Copyright; Dedication; Acknowledgments; Endorsements; Contents; List of figures; About the Author; About the Technical Editor; Foreword; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions, and Contributions; Chapter 1: Why Python Forensics?; Introduction; Cybercrime investigation challenges; How can the Python programming environment help meet these challenges?; Global support for Python; Open source and platform independence
Lifecycle positioningCost and barriers to entry; Python and the Daubert evidence standard; Organization of the book; Chapter review; Summary questions; Additional Resources; Chapter 2: Setting up a Python Forensics Environment; Introduction; Setting up a python forensics environment; The right environment; The Python Shell; Choosing a python version; Installing python on windows; Python packages and modules; The Python Standard Library; What is included in the standard library?; Built-in functions; hex() and bin(); range(); Other built-in functions; Built-in constants; Built-in types Built-in exceptionsFile and directory access; Data compression and archiving; File formats; Cryptographic services; Operating system services; Standard Library summary; Third-party packages and modules; The natural language toolkit [NLTK]; Twisted matrix [TWISTED]; Integrated development environments; What are the options?; IDLE; WingIDE; Python running on Ubuntu Linux; Python on mobile devices; iOS Python app; Windows 8 phone; A virtual machine; Chapter review; Summary questions; Looking ahead; Additional Resources; Chapter 3: Our First Python Forensics App; Introduction Naming conventions and other considerationsConstants; Local variable name; Global variable name; Functions name; Object name; Module; Class names; Our first application ``one-way file system hashing ́ ́; Background; One-way hashing algorithms basic characteristics; Popular cryptographic hash algorithms?; What are the tradeoffs between one-way hashing algorithms?; What are the best-use cases for one-way hashing algorithms in forensics?; Fundamental requirements; Design considerations; Program structure; Main function; ParseCommandLine; WalkPath function; HashFile function; CSVWriter (class) LoggerWriting the code; Code walk-through; Examining main-code walk-through; ParseCommandLine(); ValiditingDirectoryWritable; WalkPath; HashFile; CSVWriter; Full code listing pfish.py; Full code listing _pfish.py; Results presentation; Chapter review; Summary questions; Looking ahead; Additional Resources; Chapter 4: Forensic Searching and Indexing Using Python; Introduction; Keyword context search; How can this be accomplished easily in Python?; Fundamental requirements; Design considerations; Main function; ParseCommandLine; SearchWords function; PrintBuffer functions; logger Writing the code |
Record Nr. | UNISA-996426339003316 |
Hosmer Chet | ||
Waltham, Massachusetts : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler |
Autore | Hosmer Chet |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (162 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Python (Computer program language) Peer-to-peer architecture (Computer networks) |
ISBN |
0-12-802742-8
0-12-802721-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your Network
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment Switch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis Printing Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index |
Record Nr. | UNINA-9910797127603321 |
Hosmer Chet | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Python passive network mapping : P2NMAP / / Chet Hosmer ; technical editor Gary C. Kessler |
Autore | Hosmer Chet |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (162 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Python (Computer program language) Peer-to-peer architecture (Computer networks) |
ISBN |
0-12-802742-8
0-12-802721-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your Network
What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment Switch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis Printing Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index |
Record Nr. | UNINA-9910818992203321 |
Hosmer Chet | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|