Perl scripting for Windows security: live response, forensic analysis, and monitoring
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen Includes bibliographical references and index pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket |
Beschreibung: | 1 Online-Ressource (197 p.) |
ISBN: | 0080555632 159749173X 9780080555638 9781597491730 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043121841 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080555632 |c electronic bk. |9 0-08-055563-2 | ||
020 | |a 159749173X |9 1-59749-173-X | ||
020 | |a 9780080555638 |c electronic bk. |9 978-0-08-055563-8 | ||
020 | |a 9781597491730 |9 978-1-59749-173-0 | ||
020 | |a 9781597491730 |9 978-1-59749-173-0 | ||
035 | |a (OCoLC)251941039 | ||
035 | |a (DE-599)BVBBV043121841 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.13/3 |2 22 | |
100 | 1 | |a Carvey, Harlan A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Perl scripting for Windows security |b live response, forensic analysis, and monitoring |c Harlan Carvey ; technical editor, Dave Kleiman |
264 | 1 | |a Burlington, Mass. |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (197 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen | ||
500 | |a Includes bibliographical references and index | ||
500 | |a pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system | ||
500 | |a "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 7 | |a COMPUTERS / Programming Languages / C♯ |2 bisacsh | |
650 | 7 | |a COMPUTERS / Programming Languages / Java |2 bisacsh | |
650 | 7 | |a COMPUTERS / Programming Languages / Pascal |2 bisacsh | |
650 | 7 | |a Microsoft Windows (Computer file) |2 blmlsh | |
650 | 7 | |a Perl (Computer program language) |2 local | |
650 | 7 | |a Object-oriented programming (Computer science) |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Microsoft Windows (Computer file) |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Object-oriented programming (Computer science) |2 fast | |
650 | 7 | |a Perl (Computer program language) |2 fast | |
650 | 4 | |a Perl (Computer program language) | |
650 | 4 | |a Object-oriented programming (Computer science) | |
650 | 4 | |a Computer security | |
700 | 1 | |a Kleiman, Dave |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028546032 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175552144211969 |
---|---|
any_adam_object | |
author | Carvey, Harlan A. |
author_facet | Carvey, Harlan A. |
author_role | aut |
author_sort | Carvey, Harlan A. |
author_variant | h a c ha hac |
building | Verbundindex |
bvnumber | BV043121841 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)251941039 (DE-599)BVBBV043121841 |
dewey-full | 005.13/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.13/3 |
dewey-search | 005.13/3 |
dewey-sort | 15.13 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03925nmm a2200601zc 4500</leader><controlfield tag="001">BV043121841</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555632</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055563-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749173X</subfield><subfield code="9">1-59749-173-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555638</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055563-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491730</subfield><subfield code="9">978-1-59749-173-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491730</subfield><subfield code="9">978-1-59749-173-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)251941039</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043121841</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.13/3</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carvey, Harlan A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perl scripting for Windows security</subfield><subfield code="b">live response, forensic analysis, and monitoring</subfield><subfield code="c">Harlan Carvey ; technical editor, Dave Kleiman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (197 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming Languages / C♯</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming Languages / Java</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming Languages / Pascal</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Perl (Computer program language)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Object-oriented programming (Computer science)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Object-oriented programming (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Perl (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Perl (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Object-oriented programming (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleiman, Dave</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028546032</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043121841 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:06Z |
institution | BVB |
isbn | 0080555632 159749173X 9780080555638 9781597491730 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028546032 |
oclc_num | 251941039 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (197 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Carvey, Harlan A. Verfasser aut Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey ; technical editor, Dave Kleiman Burlington, Mass. Syngress Pub. c2007 1 Online-Ressource (197 p.) txt rdacontent c rdamedia cr rdacarrier Title from title screen Includes bibliographical references and index pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket Microsoft Windows (Computer file) COMPUTERS / Programming Languages / C♯ bisacsh COMPUTERS / Programming Languages / Java bisacsh COMPUTERS / Programming Languages / Pascal bisacsh Microsoft Windows (Computer file) blmlsh Perl (Computer program language) local Object-oriented programming (Computer science) local Computer security local Microsoft Windows (Computer file) fast Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast Perl (Computer program language) Object-oriented programming (Computer science) Computer security Kleiman, Dave Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948 Aggregator Volltext |
spellingShingle | Carvey, Harlan A. Perl scripting for Windows security live response, forensic analysis, and monitoring Microsoft Windows (Computer file) COMPUTERS / Programming Languages / C♯ bisacsh COMPUTERS / Programming Languages / Java bisacsh COMPUTERS / Programming Languages / Pascal bisacsh Microsoft Windows (Computer file) blmlsh Perl (Computer program language) local Object-oriented programming (Computer science) local Computer security local Microsoft Windows (Computer file) fast Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast Perl (Computer program language) Object-oriented programming (Computer science) Computer security |
title | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_auth | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_exact_search | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_full | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey ; technical editor, Dave Kleiman |
title_fullStr | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey ; technical editor, Dave Kleiman |
title_full_unstemmed | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey ; technical editor, Dave Kleiman |
title_short | Perl scripting for Windows security |
title_sort | perl scripting for windows security live response forensic analysis and monitoring |
title_sub | live response, forensic analysis, and monitoring |
topic | Microsoft Windows (Computer file) COMPUTERS / Programming Languages / C♯ bisacsh COMPUTERS / Programming Languages / Java bisacsh COMPUTERS / Programming Languages / Pascal bisacsh Microsoft Windows (Computer file) blmlsh Perl (Computer program language) local Object-oriented programming (Computer science) local Computer security local Microsoft Windows (Computer file) fast Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast Perl (Computer program language) Object-oriented programming (Computer science) Computer security |
topic_facet | Microsoft Windows (Computer file) COMPUTERS / Programming Languages / C♯ COMPUTERS / Programming Languages / Java COMPUTERS / Programming Languages / Pascal Perl (Computer program language) Object-oriented programming (Computer science) Computer security |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=216948 |
work_keys_str_mv | AT carveyharlana perlscriptingforwindowssecurityliveresponseforensicanalysisandmonitoring AT kleimandave perlscriptingforwindowssecurityliveresponseforensicanalysisandmonitoring |