- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 170字
- 2021-08-20 10:17:08
Summary
This chapter continued from where we left off in previous chapter, and helped us build a solid Python foundation for later chapters. We covered advanced data types and object-oriented programming, developed our first scripts, and dived into traceback messages. At this point, you should start to become comfortable with Python, though repeat these two chapters and manually type out the code to help strengthen your comfort level as needed. We highly recommend to practice and experiment by either testing out ideas in the interactive prompt or modifying the scripts we developed. The code for this project can be downloaded from GitHub or Packt, as described in the Preface.
As we move away from theory and look into the core part of this book, we will start with simple scripts and work toward increasingly more complicated programs. This should allow a natural development of understanding programming and skills. In the next chapter, you will learn how to parse the setupapi.dev.log file on Windows systems to identify USB installation times.
- RESTful Java Web Services Security
- Node Security
- 特種木馬防御與檢測技術(shù)研究
- 網(wǎng)絡(luò)安全保障能力研究
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 深入淺出隱私計算:技術(shù)解析與應(yīng)用實踐
- 黑客攻防入門秘笈
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 移動APT:威脅情報分析與數(shù)據(jù)防護(hù)
- Falco云原生安全:Falco原理、實踐與擴展
- Building a Home Security System with BeagleBone
- 黑客攻防從入門到精通
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Mastering Metasploit