<p/><br></br><p><b> Book Synopsis </b></p></br></br>Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.<br>You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.<i><br></i><i><b>PowerShell and Python Together</b></i><b> </b>takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.<br> <p><b><br></b></p><p><b>What You'll Learn</b></p> <p></p><ul><li>Leverage the internals of PowerShell for: digital investigation, incident response, and forensics<br></li><li>Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities<br></li><li>Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise<br></li></ul><p></p> <p></p> <p></p> <p><b><br></b></p><p><b>Who This Book Is For</b></p> System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses<p></p><p/><br></br><p><b> From the Back Cover </b></p></br></br>Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.<br>You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.<i><br></i><i>PowerShell and Python Together</i><b> </b>takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.<br><p>What You'll Learn: <br></p><p></p><ul><li>Leverage the internals of PowerShell for: digital investigation, incident response, and forensics<br></li><li>Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities<br></li><li>Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise<br></li></ul><p></p><p></p><p></p><p><br></p><p/><br></br><p><b> About the Author </b></p></br></br><p><b>Chet Hosmer</b> is the founder of Python Forensics, Inc., a non-profit organization focused on the collaborative development of open source investigative technologies using Python and other popular scripting languages. He has been researching and developing technology and training surrounding forensics, digital investigation, and steganography for decades. He has made numerous appearances to discuss emerging cyber threats, including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics with IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine.<br></p>Chet is the author of six recent books: <i>Defending IoT Infrastructures with the Raspberry Pi </i>(Apress)<i>, </i> <i>Passive Python Network Mapping, </i> <i>Python Forensics, </i> <i>Integrating Python with Leading Computer Forensic </i><i>Platforms, </i> <i>Data Hiding</i> (co-authored with Mike Raggo), <i>Executing Windows Command Line Investigation</i> (co-authored with Joshua Bartolomie and Rosanne Pelli).<p></p><p>Chet serves as a visiting professor at Utica College in the cybersecurity graduate program where his research and teaching focus on advanced steganography/data hiding methods and the latest active cyber defense methods and techniques. He also is an adjunct professor at Champlain College, where his research and teaching focus is on applying Python and other scripting languages to solve challenging problems in digital investigation and forensics.<br></p><p>Chet resides on the Grand Strand of South Carolina with his wife Janet, son Matthew, two Labrador retrievers (Bailey and Vinny), and feline tenants Lucy, Sasha, and Evander.<br></p>
Cheapest price in the interval: 37.99 on October 22, 2021
Most expensive price in the interval: 37.99 on December 20, 2021
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us