Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perl Scripting for IT Security

Buy
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.

*Perl is the third most commonly used programming language in the world
*Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more
*The companion Web site for the book contains dozens of scripts the reader can download and use today

About the Author

Harlan Carvey developed an interest in computer security while in the military. After leaving active duty, he began working in the area of penetration testing and vulnerability assessments, leading teams of engineers, and developing his own tools to optimize his ability to collect and analyze data. As most clients employed Windows to some degree, Harlan began to see a disparity in knowledge and support for these operating systems, and decided to seize the opportunity and focus on Windows as an area of interest and research. This led him to address topics in incident response and forensic analysis, and to his position as a forensic analyst.

Harlan has been a prolific author and presenter, beginning with the Usenix LISA-NT conference in 2000. He has also presented at Black Hat, DefCon 9, MISTI, and HTCIA/GMU conferences. Harlan has had articles published in the Information Security Bulletin as well as on the SecurityFocus web site, and is the author of Windows Forensics and Incident Recovery.
(HTML tags aren't allowed.)

Managing Projects with Microsoft  Visual Studio  Team System (Pro-Developer)
Managing Projects with Microsoft Visual Studio Team System (Pro-Developer)
This book is a practical guide to using the integrated tools in Visual Studio Team System to manage a team-development process. Project managers typically use a wide range of tools—such as Microsoft Office Excel®, Microsoft Office Project, and Microsoft Windows® SharePoint® Services. The Visual Studio Project Management Tools are...
Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
Practical Load Balancing: Ride the Performance Tiger
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get...

Expert One-on-One J2EE Development without EJB
Expert One-on-One J2EE Development without EJB
Are your J2EE projects taking too long to develop? Are they hard to debug? Do they result in disappointing performance? You may still be using traditional approaches to J2EE that are overly complex and not truly object-oriented. Many of these problems relate to EJB: a complex technology that has not lived up to its hype.

In this hands-on guide,...

The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
alo Alto Networks, Inc. (NYSE: PANW) is an international cybersecurity organization located in Santa Clara, California. Its essential products include an integrated firewall framework and cloud-based offerings that expand sure firewalls to cover other protection issues. About 70,000 businesses in 150 countries utilize the...
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)

The bestselling CompTIA A+ reference and test preparation guide--fully revised for the new 2012 exam topics

Written by the leading authority on CompTIA A+ certification and training, the new edition of this trusted resource offers complete, up-to-date coverage of CompTIA A+ exams 220-801 and 220-802. You’ll find learning...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy