Perl scripting for Windows security :: live response, forensic analysis, and monitoring /
"This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not requ...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass. :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket |
Beschreibung: | 1 online resource (197 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080555638 0080555632 159749173X 9781597491730 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn251941039 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 080709s2007 maua ob 001 0 eng d | ||
040 | |a NUI |b eng |e pn |c NUI |d N$T |d YDXCP |d IDEBK |d UMI |d CEF |d E7B |d OCLCQ |d NHM |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCO |d VLB |d OCLCQ |d OCLCA |d OCLCF |d OCLCQ |d JBG |d OCLCA |d UAB |d OCLCQ |d VTS |d OCLCA |d WYU |d STF |d AU@ |d M8D |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 191735816 |a 319430610 |a 648331464 |a 1044306346 |a 1056382657 |a 1058015213 |a 1064086521 |a 1075451700 |a 1103278466 |a 1129361120 |a 1153008656 |a 1192344254 |a 1240506604 | ||
020 | |a 9780080555638 |q (electronic bk.) | ||
020 | |a 0080555632 |q (electronic bk.) | ||
020 | |a 159749173X | ||
020 | |a 9781597491730 | ||
020 | |z 9781597491730 | ||
035 | |a (OCoLC)251941039 |z (OCoLC)191735816 |z (OCoLC)319430610 |z (OCoLC)648331464 |z (OCoLC)1044306346 |z (OCoLC)1056382657 |z (OCoLC)1058015213 |z (OCoLC)1064086521 |z (OCoLC)1075451700 |z (OCoLC)1103278466 |z (OCoLC)1129361120 |z (OCoLC)1153008656 |z (OCoLC)1192344254 |z (OCoLC)1240506604 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a QA76.73.P33 |b C37 2007eb | |
072 | 7 | |a COM |x 051310 |2 bisacsh | |
072 | 7 | |a COM |x 051280 |2 bisacsh | |
072 | 7 | |a COM |x 051130 |2 bisacsh | |
082 | 7 | |a 005.13/3 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Carvey, Harlan A. |0 http://id.loc.gov/authorities/names/no2004091553 | |
245 | 1 | 0 | |a Perl scripting for Windows security : |b live response, forensic analysis, and monitoring / |c Harlan Carvey ; technical editor, Dave Kleiman. |
260 | |a Burlington, Mass. : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (197 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system. | |
520 | 1 | |a "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket | |
630 | 0 | 0 | |a Microsoft Windows (Computer file) |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 blmlsh |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
650 | 0 | |a Perl (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh95010633 | |
650 | 0 | |a Object-oriented programming (Computer science) |0 http://id.loc.gov/authorities/subjects/sh87007503 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Perl (Langage de programmation) | |
650 | 6 | |a Programmation orientée objet (Informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Programming Languages |x C♯ |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Programming Languages |x Java. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Programming Languages |x Pascal. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Object-oriented programming (Computer science) |2 fast | |
650 | 7 | |a Perl (Computer program language) |2 fast | |
700 | 1 | |a Kleiman, Dave. |4 edt | |
758 | |i has work: |a Perl scripting for Windows security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGdGGGKTwXPd86dwYcjmbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Carvey, Harlan A. |t Perl scripting for Windows security. |d Burlington, Ma : Syngress, ©2007 |z 159749173X |z 9781597491730 |w (OCoLC)191034352 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216948 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBSCOhost |b EBSC |n 216948 | ||
938 | |a YBP Library Services |b YANK |n 2766973 | ||
938 | |a YBP Library Services |b YANK |n 2802919 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn251941039 |
---|---|
_version_ | 1816881673901441024 |
adam_text | |
any_adam_object | |
author | Carvey, Harlan A. |
author2 | Kleiman, Dave |
author2_role | edt |
author2_variant | d k dk |
author_GND | http://id.loc.gov/authorities/names/no2004091553 |
author_facet | Carvey, Harlan A. Kleiman, Dave |
author_role | |
author_sort | Carvey, Harlan A. |
author_variant | h a c ha hac |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.73.P33 C37 2007eb |
callnumber-search | QA76.73.P33 C37 2007eb |
callnumber-sort | QA 276.73 P33 C37 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system. |
ctrlnum | (OCoLC)251941039 |
dewey-full | 005.13/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.13/3 |
dewey-search | 005.13/3 |
dewey-sort | 15.13 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04917cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn251941039</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">080709s2007 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NUI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NUI</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NHM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCA</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">191735816</subfield><subfield code="a">319430610</subfield><subfield code="a">648331464</subfield><subfield code="a">1044306346</subfield><subfield code="a">1056382657</subfield><subfield code="a">1058015213</subfield><subfield code="a">1064086521</subfield><subfield code="a">1075451700</subfield><subfield code="a">1103278466</subfield><subfield code="a">1129361120</subfield><subfield code="a">1153008656</subfield><subfield code="a">1192344254</subfield><subfield code="a">1240506604</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555638</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555632</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749173X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491730</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597491730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)251941039</subfield><subfield code="z">(OCoLC)191735816</subfield><subfield code="z">(OCoLC)319430610</subfield><subfield code="z">(OCoLC)648331464</subfield><subfield code="z">(OCoLC)1044306346</subfield><subfield code="z">(OCoLC)1056382657</subfield><subfield code="z">(OCoLC)1058015213</subfield><subfield code="z">(OCoLC)1064086521</subfield><subfield code="z">(OCoLC)1075451700</subfield><subfield code="z">(OCoLC)1103278466</subfield><subfield code="z">(OCoLC)1129361120</subfield><subfield code="z">(OCoLC)1153008656</subfield><subfield code="z">(OCoLC)1192344254</subfield><subfield code="z">(OCoLC)1240506604</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000038</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.73.P33</subfield><subfield code="b">C37 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051310</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051280</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051130</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.13/3</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carvey, Harlan A.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004091553</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perl scripting for Windows security :</subfield><subfield code="b">live response, forensic analysis, and monitoring /</subfield><subfield code="c">Harlan Carvey ; technical editor, Dave Kleiman.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (197 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system.</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Perl (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010633</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Object-oriented programming (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh87007503</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Perl (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Programmation orientée objet (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming Languages</subfield><subfield code="x">C♯</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming Languages</subfield><subfield code="x">Java.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming Languages</subfield><subfield code="x">Pascal.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Object-oriented programming (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Perl (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleiman, Dave.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Perl scripting for Windows security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGdGGGKTwXPd86dwYcjmbd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Carvey, Harlan A.</subfield><subfield code="t">Perl scripting for Windows security.</subfield><subfield code="d">Burlington, Ma : Syngress, ©2007</subfield><subfield code="z">159749173X</subfield><subfield code="z">9781597491730</subfield><subfield code="w">(OCoLC)191034352</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216948</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">216948</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2766973</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2802919</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn251941039 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:28Z |
institution | BVB |
isbn | 9780080555638 0080555632 159749173X 9781597491730 |
language | English |
oclc_num | 251941039 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (197 pages) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Carvey, Harlan A. http://id.loc.gov/authorities/names/no2004091553 Perl scripting for Windows security : live response, forensic analysis, and monitoring / Harlan Carvey ; technical editor, Dave Kleiman. Burlington, Mass. : Syngress Pub., ©2007. 1 online resource (197 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system. "This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). Not only will consultants find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics."--Jacket Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast Perl (Computer program language) http://id.loc.gov/authorities/subjects/sh95010633 Object-oriented programming (Computer science) http://id.loc.gov/authorities/subjects/sh87007503 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Perl (Langage de programmation) Programmation orientée objet (Informatique) Sécurité informatique. COMPUTERS Programming Languages C♯ bisacsh COMPUTERS Programming Languages Java. bisacsh COMPUTERS Programming Languages Pascal. bisacsh Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast Kleiman, Dave. edt has work: Perl scripting for Windows security (Text) https://id.oclc.org/worldcat/entity/E39PCGdGGGKTwXPd86dwYcjmbd https://id.oclc.org/worldcat/ontology/hasWork Print version: Carvey, Harlan A. Perl scripting for Windows security. Burlington, Ma : Syngress, ©2007 159749173X 9781597491730 (OCoLC)191034352 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216948 Volltext |
spellingShingle | Carvey, Harlan A. Perl scripting for Windows security : live response, forensic analysis, and monitoring / pt. I. Perl scripting and live response -- Built-in functions -- Running processes -- Accessing the API -- WMI -- Accessing the registry -- ProScripts -- Final touches -- pt. II. Perl scripting and computer forensic analysis -- Log files -- Parsing binary files -- Registry -- Event logs -- Parsing RAM dumps -- ProScripts -- Parsing other data -- Final touches -- pt. III. Monitoring Windows applications with Perl -- Core application processes -- Core application dependencies -- Web services -- Building a monitoring system. Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast Perl (Computer program language) http://id.loc.gov/authorities/subjects/sh95010633 Object-oriented programming (Computer science) http://id.loc.gov/authorities/subjects/sh87007503 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Perl (Langage de programmation) Programmation orientée objet (Informatique) Sécurité informatique. COMPUTERS Programming Languages C♯ bisacsh COMPUTERS Programming Languages Java. bisacsh COMPUTERS Programming Languages Pascal. bisacsh Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010633 http://id.loc.gov/authorities/subjects/sh87007503 https://id.nlm.nih.gov/mesh/D016494 |
title | Perl scripting for Windows security : live response, forensic analysis, and monitoring / |
title_auth | Perl scripting for Windows security : live response, forensic analysis, and monitoring / |
title_exact_search | Perl scripting for Windows security : live response, forensic analysis, and monitoring / |
title_full | Perl scripting for Windows security : live response, forensic analysis, and monitoring / Harlan Carvey ; technical editor, Dave Kleiman. |
title_fullStr | Perl scripting for Windows security : live response, forensic analysis, and monitoring / Harlan Carvey ; technical editor, Dave Kleiman. |
title_full_unstemmed | Perl scripting for Windows security : live response, forensic analysis, and monitoring / Harlan Carvey ; technical editor, Dave Kleiman. |
title_short | Perl scripting for Windows security : |
title_sort | perl scripting for windows security live response forensic analysis and monitoring |
title_sub | live response, forensic analysis, and monitoring / |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Microsoft Windows (Computer file) fast Perl (Computer program language) http://id.loc.gov/authorities/subjects/sh95010633 Object-oriented programming (Computer science) http://id.loc.gov/authorities/subjects/sh87007503 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Perl (Langage de programmation) Programmation orientée objet (Informatique) Sécurité informatique. COMPUTERS Programming Languages C♯ bisacsh COMPUTERS Programming Languages Java. bisacsh COMPUTERS Programming Languages Pascal. bisacsh Computer security fast Object-oriented programming (Computer science) fast Perl (Computer program language) fast |
topic_facet | Microsoft Windows (Computer file) Perl (Computer program language) Object-oriented programming (Computer science) Computer security. Computer Security Perl (Langage de programmation) Programmation orientée objet (Informatique) Sécurité informatique. COMPUTERS Programming Languages C♯ COMPUTERS Programming Languages Java. COMPUTERS Programming Languages Pascal. Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=216948 |
work_keys_str_mv | AT carveyharlana perlscriptingforwindowssecurityliveresponseforensicanalysisandmonitoring AT kleimandave perlscriptingforwindowssecurityliveresponseforensicanalysisandmonitoring |