|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn895288472 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141114s2015 maua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d E7B
|d UIU
|d WAU
|d OCLCF
|d DEBBG
|d B24X7
|d STF
|d COO
|d OCLCO
|d DEBSZ
|d EBLCP
|d N$T
|d YDXCP
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d LIV
|d MERUC
|d U3W
|d D6H
|d CEF
|d CNO
|d OCLCQ
|d CUY
|d LOA
|d ZCU
|d G3B
|d CNCEN
|d S8J
|d ICG
|d K6U
|d COCUF
|d CNNOR
|d DKC
|d AU@
|d OCLCQ
|d VT2
|d OCLCQ
|d BRF
|d CZL
|d DST
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 893740539
|a 1058769734
|a 1097118172
|a 1295595308
|a 1300609546
|a 1303329493
|
020 |
|
|
|a 9780128014684
|
020 |
|
|
|a 0128014687
|
020 |
|
|
|a 0128013087
|
020 |
|
|
|a 9780128013083
|
020 |
|
|
|z 9780128013083
|
029 |
1 |
|
|a AU@
|b 000054998643
|
029 |
1 |
|
|a CHNEW
|b 001012543
|
029 |
1 |
|
|a DEBBG
|b BV042490203
|
029 |
1 |
|
|a DEBBG
|b BV043613152
|
029 |
1 |
|
|a DEBSZ
|b 431803196
|
029 |
1 |
|
|a DEBSZ
|b 434138681
|
029 |
1 |
|
|a DEBSZ
|b 434833835
|
035 |
|
|
|a (OCoLC)895288472
|z (OCoLC)893740539
|z (OCoLC)1058769734
|z (OCoLC)1097118172
|z (OCoLC)1295595308
|z (OCoLC)1300609546
|z (OCoLC)1303329493
|
037 |
|
|
|a CL0500000502
|b Safari Books Online
|
050 |
|
4 |
|a TK7882.E2
|b .S456 2015
|
072 |
|
7 |
|a POL
|x 040020
|2 bisacsh
|
072 |
|
7 |
|a POL
|x 011000
|2 bisacsh
|
082 |
0 |
4 |
|a 327.12
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shimonski, Robert,
|e author.
|
245 |
1 |
0 |
|a Cyber reconnaissance surveillance and defense /
|c Robert Shimonski.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c ©2015.
|
300 |
|
|
|a 1 online resource (xiv, 240 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 7, 2014).
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester.
|
505 |
8 |
|
|a Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking.
|
505 |
8 |
|
|a Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance.
|
505 |
8 |
|
|a Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home).
|
505 |
8 |
|
|a Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic intelligence.
|
650 |
|
0 |
|a Internet in espionage.
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Renseignement électronique.
|
650 |
|
6 |
|a Internet dans l'espionnage.
|
650 |
|
6 |
|a Surveillance des menaces informatiques.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Government
|x International.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x International Relations
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|
650 |
|
7 |
|a Electronic intelligence
|2 fast
|
650 |
|
7 |
|a Internet in espionage
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Shimonski, Robert.
|t Cyber reconnaissance, surveillance, and defense.
|d Waltham, MA, USA : Syngress is an imprint of Elsevier, [2015]
|z 9780128013083
|w (DLC) 2014031815
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128013083/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00077730
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1820202
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10958564
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 876786
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12130477
|
994 |
|
|
|a 92
|b IZTAP
|