- Kornblum, J. (2006). Identifying Almost Identical Files Using Context Triggered Piecewise Hashing, Digital Investigation, 91-97. Retrieved October 31, 2015, from http://dfrws.org/2006/proceedings/12-Kornblum.pdf
- Stevens, M. Karpmanm P. Peyrin, T. (2015), RESEARCHERS URGE: INDUSTRY STANDARD SHA-1 SHOULD BE RETRACTED SOONER, retrieved October 31, 2015, from https://ee788fc4-a-62cb3a1a-s-sites.googlegroups.com/site/itstheshappening/shappening_PR.pdf
Learning Python for Forensics - Second Edition
By :
Learning Python for Forensics - Second Edition
By:
Overview of this book
Digital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents. This second edition of Learning Python for Forensics illustrates how Python can be used to support these digital investigations and permits the examiner to automate the parsing of forensic artifacts to spend more time examining actionable data.
The second edition of Learning Python for Forensics will illustrate how to develop Python scripts using an iterative design. Further, it demonstrates how to leverage the various built-in and community-sourced forensics scripts and libraries available for Python today. This book will help strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
By the end of this book, you will build a collection of Python scripts capable of investigating an array of forensic artifacts and master the skills of extracting metadata and parsing complex data structures into actionable reports. Most importantly, you will have developed a foundation upon which to build as you continue to learn Python and enhance your efficacy as an investigator.
Table of Contents (15 chapters)
Preface
Free Chapter
Now for Something Completely Different
Python Fundamentals
Parsing Text Files
Working with Serialized Data Structures
Databases in Python
Extracting Artifacts from Binary Files
Fuzzy Hashing
The Media Age
Uncovering Time
Rapidly Triaging Systems
Parsing Outlook PST Containers
Recovering Transient Database Records
Coming Full Circle
Other Books You May Enjoy
Customer Reviews