Cargando…

Open source intelligence methods and tools : a practical guide to online intelligence /

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing busine...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hassan, Nihad A. (Autor), Hijazi, Rami (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : Apress, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1043830928
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 180711s2018 xxua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d GW5XE  |d N$T  |d YDX  |d UAB  |d UPM  |d UMI  |d STF  |d OCLCF  |d WAU  |d TOH  |d EBLCP  |d VT2  |d MOQ  |d CEF  |d WYU  |d OTZ  |d G3B  |d LVT  |d OCLCQ  |d OCLCO  |d U3W  |d CAUOI  |d UKMGB  |d SNK  |d YOU  |d K6U  |d MERER  |d OCLCO  |d OCLCQ  |d COO  |d LEAUB  |d FVL  |d OCLCQ  |d OCLCO  |d UHL  |d OCLCQ  |d UKAHL  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
015 |a GBB912982  |2 bnb 
016 7 |a 019206045  |2 Uk 
019 |a 1043878266  |a 1044716265  |a 1047683447  |a 1047731038  |a 1050975432  |a 1055389856  |a 1066456140  |a 1081292994  |a 1086536938  |a 1097116989  |a 1112954189 
020 |a 9781484232132  |q (electronic bk.) 
020 |a 1484232135  |q (electronic bk.) 
020 |a 1484232127 
020 |a 9781484232125 
020 |z 9781484232125  |q (print) 
020 |z 1484232127 
024 3 |a 9781484232125 
024 7 |a 10.1007/978-1-4842-3213-2  |2 doi 
024 8 |a 9781484232132 
029 1 |a AU@  |b 000063679138 
029 1 |a CHNEW  |b 001063591 
029 1 |a CHVBK  |b 575141549 
029 1 |a GBVCP  |b 1029872937 
029 1 |a UKMGB  |b 019206045 
035 |a (OCoLC)1043830928  |z (OCoLC)1043878266  |z (OCoLC)1044716265  |z (OCoLC)1047683447  |z (OCoLC)1047731038  |z (OCoLC)1050975432  |z (OCoLC)1055389856  |z (OCoLC)1066456140  |z (OCoLC)1081292994  |z (OCoLC)1086536938  |z (OCoLC)1097116989  |z (OCoLC)1112954189 
037 |a CL0500000983  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Hassan, Nihad A.,  |e author. 
245 1 0 |a Open source intelligence methods and tools :  |b a practical guide to online intelligence /  |c Nihad A. Hassan, Rami Hijazi. 
264 1 |a [United States] :  |b Apress,  |c 2018. 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer 
264 4 |c ©2018 
300 |a 1 online resource (xxiii, 354 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 12, 2018). 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Next?.- 
520 |a Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. 
542 |f © Copyright 2018 Nihad A. Hassan, Rami Hijazi.  |g 2018. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Open source software. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels libres. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Open source software  |2 fast 
700 1 |a Hijazi, Rami,  |e author. 
776 0 8 |i Print version:  |a Hassan, Nihad A.  |t Open source intelligence methods and tools.  |d [United States] : Apress, 2018  |z 1484232127  |z 9781484232125  |w (OCoLC)1022082298 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484232132/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35093445 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5446001 
938 |a EBSCOhost  |b EBSC  |n 1842427 
938 |a YBP Library Services  |b YANK  |n 15586368 
994 |a 92  |b IZTAP