|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1351739417 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
221127s2022 enk o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d ORMDA
|d OCLCF
|d IEEEE
|d OCLCO
|
020 |
|
|
|a 9781801810647
|q (electronic bk.)
|
020 |
|
|
|a 1801810648
|q (electronic bk.)
|
020 |
|
|
|z 1801810214
|
020 |
|
|
|z 9781801810210
|
035 |
|
|
|a (OCoLC)1351739417
|
037 |
|
|
|a 9781801810210
|b O'Reilly Media
|
037 |
|
|
|a 10162754
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221220
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gunawardana, Kushantha,
|e author.
|
245 |
1 |
0 |
|a ETHICAL GUIDE TO CYBER ANONYMITY
|h [electronic resource] :
|b concepts, tools,and techniques to be anonymous from criminals, unethical hackers, and governments /
|c Kushantha Gunawardana.
|
260 |
|
|
|a Birmingham, UK :
|b Packt Publishing Ltd.,
|c 2022.
|
300 |
|
|
|a 1 online resource
|
520 |
|
|
|a Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book Description As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web. You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you'll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions. By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity. What you will learn Understand privacy concerns in cyberspace Discover how attackers compromise privacy Learn methods used by attackers to trace individuals and companies Grasp the benefits of being anonymous over the web Discover ways to maintain cyber anonymity Learn artifacts that attackers and competitors are interested in Who this book is for This book is targeted at journalists, security researchers, ethical hackers, and anyone who wishes to stay anonymous while using the web. This book is also for parents who wish to keep their kid's identities anonymous on the web.
|
505 |
0 |
|
|a Table of Contents Understanding Sensitive Information Ways That Attackers Use Your Data Ways That Attackers Reveal the Privacy of Individuals and Companies Techniques that Attackers Use to Compromise Privacy Tools and Techniques That Attackers Use Artifacts that Attackers Can Collect from You Introduction to Cyber Anonymity Understanding the Scope of Access Avoiding Behavior Tracking Applications and Browsers Proxy Chains and Anonymizers.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Safety measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Safety measures
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1801810214
|z 9781801810210
|w (OCoLC)1346215503
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781801810210/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 303275196
|
994 |
|
|
|a 92
|b IZTAP
|