|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1085909379 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190215s2018 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d UKMGB
|d N$T
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d KSU
|d GZN
|d OCLCQ
|d VLB
|d OCLCO
|
015 |
|
|
|a GBB965499
|2 bnb
|
016 |
7 |
|
|a 019247295
|2 Uk
|
020 |
|
|
|a 1789138302
|
020 |
|
|
|a 9781789138306
|q (electronic bk.)
|
020 |
|
|
|z 9781789133363
|
029 |
1 |
|
|a UKMGB
|b 019247295
|
029 |
1 |
|
|a AU@
|b 000068892052
|
035 |
|
|
|a (OCoLC)1085909379
|
037 |
|
|
|a CL0501000027
|b Safari Books Online
|
050 |
|
4 |
|a ZA4230
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Retzkin, Sion,
|e author.
|
245 |
1 |
0 |
|a Hands-on Dark Web analysis :
|b learn what goes on in the Dark Web, and how to work with it /
|c Sion Retzkin.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (iii, 189 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (Proquest, viewed October 25, 2022)
|
505 |
0 |
|
|a Table of ContentsUnderstanding the Deep WebWorking with the Deep WebThe future of the Deep WebInstalling a Linux Virtual MachineAccessing the Deep Web with ToR browserInstalling TailsOSInstalling WhonixInstalling Qubes OSWhat goes on in the Dark Net -- Case StudiesThe dangers of the Dark NetUsing the Dark Net for your business.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book Description The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis What you will learn Access the Deep Web and the Dark Web Learn to search and find information in the Dark Web Protect yourself while browsing the Dark Web Understand what the Deep Web and Dark Web are Learn what information you can gather, and how Who this book is for This book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Dark Web.
|
650 |
|
0 |
|a Invisible Web.
|
650 |
|
0 |
|a World Wide Web.
|
650 |
|
2 |
|a Internet
|
650 |
|
6 |
|a Internet clandestin.
|
650 |
|
6 |
|a Web invisible.
|
650 |
|
6 |
|a Web.
|
650 |
|
7 |
|a World Wide Web.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Dark Web
|2 fast
|
650 |
|
7 |
|a Invisible Web
|2 fast
|
650 |
|
7 |
|a World Wide Web
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781789133363/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1991511
|
994 |
|
|
|a 92
|b IZTAP
|