Limit this search to....

Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
Contributor(s): Carvey, Harlan (Author)
ISBN: 159749173X     ISBN-13: 9781597491730
Publisher: Syngress Publishing
OUR PRICE:   $54.40  
Product Type: Paperback - Other Formats
Published: December 2007
Qty:
Annotation: More than just a practical guide to performing real-world tasks, this book provides working code to the reader, illustrating techniques they can use to extract information from Windows systems allowing programs to be up and running much quicker.
Additional Information
BISAC Categories:
- Computers | Programming Languages - Javascript
- Computers | Security - General
Dewey: 792.026
LCCN: 2008270941
Physical Information: 0.54" H x 7.59" W x 9.18" (1.01 lbs) 232 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay...I'll come clean...I used nothing but Perl in both books What I've seen as a result of this is that many readers want to use the tools, but don't know how...they simply aren't familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.