Cargando…

Cyber reconnaissance surveillance and defense /

Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shimonski, Robert (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2015.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn895288472
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141114s2015 maua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d E7B  |d UIU  |d WAU  |d OCLCF  |d DEBBG  |d B24X7  |d STF  |d COO  |d OCLCO  |d DEBSZ  |d EBLCP  |d N$T  |d YDXCP  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d LIV  |d MERUC  |d U3W  |d D6H  |d CEF  |d CNO  |d OCLCQ  |d CUY  |d LOA  |d ZCU  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d CNNOR  |d DKC  |d AU@  |d OCLCQ  |d VT2  |d OCLCQ  |d BRF  |d CZL  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 893740539  |a 1058769734  |a 1097118172  |a 1295595308  |a 1300609546  |a 1303329493 
020 |a 9780128014684 
020 |a 0128014687 
020 |a 0128013087 
020 |a 9780128013083 
020 |z 9780128013083 
029 1 |a AU@  |b 000054998643 
029 1 |a CHNEW  |b 001012543 
029 1 |a DEBBG  |b BV042490203 
029 1 |a DEBBG  |b BV043613152 
029 1 |a DEBSZ  |b 431803196 
029 1 |a DEBSZ  |b 434138681 
029 1 |a DEBSZ  |b 434833835 
035 |a (OCoLC)895288472  |z (OCoLC)893740539  |z (OCoLC)1058769734  |z (OCoLC)1097118172  |z (OCoLC)1295595308  |z (OCoLC)1300609546  |z (OCoLC)1303329493 
037 |a CL0500000502  |b Safari Books Online 
050 4 |a TK7882.E2  |b .S456 2015 
072 7 |a POL  |x 040020  |2 bisacsh 
072 7 |a POL  |x 011000  |2 bisacsh 
082 0 4 |a 327.12  |2 23 
049 |a UAMI 
100 1 |a Shimonski, Robert,  |e author. 
245 1 0 |a Cyber reconnaissance surveillance and defense /  |c Robert Shimonski. 
260 |a Waltham, MA :  |b Syngress,  |c ©2015. 
300 |a 1 online resource (xiv, 240 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (Safari, viewed November 7, 2014). 
500 |a Includes index. 
520 |a Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. --  |c Edited summary from book. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester. 
505 8 |a Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking. 
505 8 |a Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance. 
505 8 |a Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home). 
505 8 |a Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic intelligence. 
650 0 |a Internet in espionage. 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer crimes. 
650 6 |a Renseignement électronique. 
650 6 |a Internet dans l'espionnage. 
650 6 |a Surveillance des menaces informatiques. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique. 
650 7 |a POLITICAL SCIENCE  |x Government  |x International.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x International Relations  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Cyber intelligence (Computer security)  |2 fast 
650 7 |a Electronic intelligence  |2 fast 
650 7 |a Internet in espionage  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Shimonski, Robert.  |t Cyber reconnaissance, surveillance, and defense.  |d Waltham, MA, USA : Syngress is an imprint of Elsevier, [2015]  |z 9780128013083  |w (DLC) 2014031815 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128013083/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00077730 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1820202 
938 |a ebrary  |b EBRY  |n ebr10958564 
938 |a EBSCOhost  |b EBSC  |n 876786 
938 |a YBP Library Services  |b YANK  |n 12130477 
994 |a 92  |b IZTAP