Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Acknowledgments Endorsements List of figures About the Author About the Technical Editor Foreword Preface
Intended audience Prerequisites Reading this book Supported platforms Download software Comments, questions, and contributions
Chapter 1: Why Python Forensics?
Abstract Introduction Cybercrime investigation challenges How can the Python programming environment help meet these challenges? Python and the Daubert evidence standard Organization of the book Chapter review Summary questions
Chapter 2: Setting up a Python Forensics Environment
Abstract Introduction Setting up a python forensics environment The right environment Choosing a python version Installing python on windows Python packages and modules What is included in the standard library? Third-party packages and modules Integrated development environments Python on mobile devices A virtual machine Chapter review Summary questions Looking ahead
Chapter 3: Our First Python Forensics App
Abstract Introduction Naming conventions and other considerations Our first application “one-way file system hashing” Code walk-through Results presentation Chapter review Summary questions Looking ahead
Chapter 4: Forensic Searching and Indexing Using Python
Abstract Introduction Keyword context search Code walk-through Results presentation Indexing Coding isWordProbable p-search complete code listings Chapter review Summary questions
Chapter 5: Forensic Evidence Extraction (JPEG and TIFF)
Abstract Introduction Code Walk-Through Chapter review Summary questions
Chapter 6: Forensic Time
Abstract Introduction Adding time to the equation The time module The Network Time Protocol Obtaining and installing the NTP Library ntplib World NTP Servers NTP Client Setup Script Chapter review Summary questions
Chapter 7: Using Natural Language Tools in Forensics
Abstract What is Natural Language Processing? Installing the Natural Language Toolkit and associated libraries Working with a corpus Experimenting with NLTK Creating a corpus from the Internet NLTKQuery application Chapter review Summary questions
Chapter 8: Network Forensics: Part I
Abstract Network investigation basics Captain Ramius: re-verify our range to target… one ping only Port scanning Chapter review Summary questions
Chapter 9: Network Forensics: Part II
Abstract Introduction Packet sniffing Raw sockets in Python Python Silent Network Mapping Tool (PSNMT) PSNMT source code Program execution and output Chapter review Summary question/challenge
Chapter 10: Multiprocessing for Forensics
Abstract Introduction What is multiprocessing? Python multiprocessing support Simplest multiprocessing example Multiprocessing File Hash Multiprocessing Hash Table generation Chapter review Summary question/challenge
Chapter 11: Rainbow in the Cloud
Abstract Introduction Putting the cloud to work Cloud options Creating rainbows in the cloud Password Generation Calculations Chapter review Summary question/challenge
Chapter 12: Looking Ahead
Abstract Introduction Where do we go from here? Conclusion
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion