Perl scripting for Windows security: live response, forensic analysis, and monitoring
The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Syngress Media
2007
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today |
Beschreibung: | 1 online resource |
ISBN: | 9781597491730 159749173X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046123705 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597491730 |9 978-1-59749-173-0 | ||
020 | |a 159749173X |9 1-59749-173-X | ||
035 | |a (ZDB-33-ESD)ocn162131599 | ||
035 | |a (OCoLC)162131599 | ||
035 | |a (DE-599)BVBBV046123705 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.13/3 |2 22 | |
100 | 1 | |a Carvey, Harlan A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Perl scripting for Windows security |b live response, forensic analysis, and monitoring |c Harlan Carvey |
264 | 1 | |a [Place of publication not identified] |b Syngress Media |c 2007 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today | ||
650 | 7 | |a Computer programming |2 fast | |
650 | 7 | |a Perl (Computer program language) |2 fast | |
650 | 4 | |a Perl (Computer program language) | |
650 | 4 | |a Computer programming | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491730 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504158 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597491730 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180440925339648 |
---|---|
any_adam_object | |
author | Carvey, Harlan A. |
author_facet | Carvey, Harlan A. |
author_role | aut |
author_sort | Carvey, Harlan A. |
author_variant | h a c ha hac |
building | Verbundindex |
bvnumber | BV046123705 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162131599 (OCoLC)162131599 (DE-599)BVBBV046123705 |
dewey-full | 005.13/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.13/3 |
dewey-search | 005.13/3 |
dewey-sort | 15.13 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02461nmm a2200373zc 4500</leader><controlfield tag="001">BV046123705</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491730</subfield><subfield code="9">978-1-59749-173-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749173X</subfield><subfield code="9">1-59749-173-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162131599</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131599</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046123705</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.13/3</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carvey, Harlan A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perl scripting for Windows security</subfield><subfield code="b">live response, forensic analysis, and monitoring</subfield><subfield code="c">Harlan Carvey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Syngress Media</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer programming</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Perl (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Perl (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491730</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504158</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597491730</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046123705 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:48Z |
institution | BVB |
isbn | 9781597491730 159749173X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504158 |
oclc_num | 162131599 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Media |
record_format | marc |
spelling | Carvey, Harlan A. Verfasser aut Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey [Place of publication not identified] Syngress Media 2007 1 online resource txt rdacontent c rdamedia cr rdacarrier The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today Computer programming fast Perl (Computer program language) fast Perl (Computer program language) Computer programming http://www.sciencedirect.com/science/book/9781597491730 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Carvey, Harlan A. Perl scripting for Windows security live response, forensic analysis, and monitoring Computer programming fast Perl (Computer program language) fast Perl (Computer program language) Computer programming |
title | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_auth | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_exact_search | Perl scripting for Windows security live response, forensic analysis, and monitoring |
title_full | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey |
title_fullStr | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey |
title_full_unstemmed | Perl scripting for Windows security live response, forensic analysis, and monitoring Harlan Carvey |
title_short | Perl scripting for Windows security |
title_sort | perl scripting for windows security live response forensic analysis and monitoring |
title_sub | live response, forensic analysis, and monitoring |
topic | Computer programming fast Perl (Computer program language) fast Perl (Computer program language) Computer programming |
topic_facet | Computer programming Perl (Computer program language) |
url | http://www.sciencedirect.com/science/book/9781597491730 |
work_keys_str_mv | AT carveyharlana perlscriptingforwindowssecurityliveresponseforensicanalysisandmonitoring |