Filter By
Books (8)
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Python Passive Network Mapping: P2NMAP by Chet Hosmer 9780128027219
RRP: £50.99Booksplease Price: £47.01Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed... -
Integrating Python with Leading Computer Forensics Platforms by Chet Hosmer 9780128099490
RRP: £41.50Booksplease Price: £38.67Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes... -
PowerShell and Python Together: Targeting Digital Investigations by Chet Hosmer 9781484245033
RRP: £39.99Booksplease Price: £27.06Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response... -
Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology by Chet Hosmer 9780124186767
RRP: £50.99Booksplease Price: £47.31Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation... -
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity by Chet Hosmer 9780128092682
RRP: £47.99Booksplease Price: £44.37The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are... -
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time by Chet Hosmer 9781484236994
RRP: £27.99Booksplease Price: £21.16Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive... -
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols by Michael T. Raggo 9781597497435
RRP: £39.99Booksplease Price: £37.32As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection... -
Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure by Jack Wiles 9781597492829
RRP: £49.99Booksplease Price: £46.42Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water...