Cyber reconnaissance surveillance and defense /
Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threa...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress,
©2015.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn895288472 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 141114s2015 maua o 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d E7B |d UIU |d WAU |d OCLCF |d DEBBG |d B24X7 |d STF |d COO |d OCLCO |d DEBSZ |d EBLCP |d N$T |d YDXCP |d SFB |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d LIV |d MERUC |d U3W |d D6H |d CEF |d CNO |d OCLCQ |d CUY |d LOA |d ZCU |d G3B |d CNCEN |d S8J |d ICG |d K6U |d COCUF |d CNNOR |d DKC |d AU@ |d OCLCQ |d VT2 |d OCLCQ |d BRF |d CZL |d DST |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 893740539 |a 1058769734 |a 1097118172 |a 1295595308 |a 1300609546 |a 1303329493 | ||
020 | |a 9780128014684 | ||
020 | |a 0128014687 | ||
020 | |a 0128013087 | ||
020 | |a 9780128013083 | ||
020 | |z 9780128013083 | ||
029 | 1 | |a AU@ |b 000054998643 | |
029 | 1 | |a CHNEW |b 001012543 | |
029 | 1 | |a DEBBG |b BV042490203 | |
029 | 1 | |a DEBBG |b BV043613152 | |
029 | 1 | |a DEBSZ |b 431803196 | |
029 | 1 | |a DEBSZ |b 434138681 | |
029 | 1 | |a DEBSZ |b 434833835 | |
035 | |a (OCoLC)895288472 |z (OCoLC)893740539 |z (OCoLC)1058769734 |z (OCoLC)1097118172 |z (OCoLC)1295595308 |z (OCoLC)1300609546 |z (OCoLC)1303329493 | ||
037 | |a CL0500000502 |b Safari Books Online | ||
050 | 4 | |a TK7882.E2 |b .S456 2015 | |
072 | 7 | |a POL |x 040020 |2 bisacsh | |
072 | 7 | |a POL |x 011000 |2 bisacsh | |
082 | 0 | 4 | |a 327.12 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Shimonski, Robert, |e author. | |
245 | 1 | 0 | |a Cyber reconnaissance surveillance and defense / |c Robert Shimonski. |
260 | |a Waltham, MA : |b Syngress, |c ©2015. | ||
300 | |a 1 online resource (xiv, 240 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed November 7, 2014). | |
500 | |a Includes index. | ||
520 | |a Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- |c Edited summary from book. | ||
505 | 0 | |a Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester. | |
505 | 8 | |a Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking. | |
505 | 8 | |a Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance. | |
505 | 8 | |a Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home). | |
505 | 8 | |a Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods. | |
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Electronic intelligence. | |
650 | 0 | |a Internet in espionage. | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer crimes. | |
650 | 6 | |a Renseignement électronique. | |
650 | 6 | |a Internet dans l'espionnage. | |
650 | 6 | |a Surveillance des menaces informatiques. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Criminalité informatique. | |
650 | 7 | |a POLITICAL SCIENCE |x Government |x International. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x International Relations |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Electronic intelligence |2 fast | |
650 | 7 | |a Internet in espionage |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
758 | |i has work: |a Cyber reconnaissance surveillance and defense (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGFGtRRQtw9mPC8HHBMhVC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shimonski, Robert. |t Cyber reconnaissance, surveillance, and defense. |d Waltham, MA, USA : Syngress is an imprint of Elsevier, [2015] |z 9780128013083 |w (DLC) 2014031815 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780128013083/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1820202 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00077730 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1820202 | ||
938 | |a ebrary |b EBRY |n ebr10958564 | ||
938 | |a EBSCOhost |b EBSC |n 876786 | ||
938 | |a YBP Library Services |b YANK |n 12130477 | ||
994 | |a 92 |b IZTAP |