|
|
|
|
LEADER |
05550nmm a2200565 u 4500 |
001 |
EB001916118 |
003 |
EBX01000000000000001079020 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0128013087
|
020 |
|
|
|a 0128014687
|
020 |
|
|
|a 9780128014684
|
050 |
|
4 |
|a TK7882.E2
|
100 |
1 |
|
|a Shimonski, Robert
|
245 |
0 |
0 |
|a Cyber reconnaissance surveillance and defense
|c Robert Shimonski
|
260 |
|
|
|a Waltham, MA
|b Syngress
|c 2015
|
300 |
|
|
|a xiv, 240 pages
|b illustrations
|
505 |
0 |
|
|a Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
|
505 |
0 |
|
|a Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods
|
505 |
0 |
|
|a Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
|
505 |
0 |
|
|a Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
|
505 |
0 |
|
|a Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
|
653 |
|
|
|a Criminalité informatique
|
653 |
|
|
|a POLITICAL SCIENCE / Government / International / bisacsh
|
653 |
|
|
|a POLITICAL SCIENCE / International Relations / General / bisacsh
|
653 |
|
|
|a Computer crimes / fast
|
653 |
|
|
|a Surveillance des menaces informatiques
|
653 |
|
|
|a Renseignement électronique
|
653 |
|
|
|a Internet / Sécurité / Mesures
|
653 |
|
|
|a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492
|
653 |
|
|
|a Internet in espionage / http://id.loc.gov/authorities/subjects/sh2005008677
|
653 |
|
|
|a Internet / Security measures
|
653 |
|
|
|a Internet / Security measures / fast
|
653 |
|
|
|a Cyber intelligence (Computer security) / fast
|
653 |
|
|
|a Electronic intelligence / http://id.loc.gov/authorities/subjects/sh85042345
|
653 |
|
|
|a Electronic intelligence / fast
|
653 |
|
|
|a Internet dans l'espionnage
|
653 |
|
|
|a Cyber intelligence (Computer security) / http://id.loc.gov/authorities/subjects/sh2011005959
|
653 |
|
|
|a Internet in espionage / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Includes index
|
776 |
|
|
|z 9780128013083
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128013083/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 327.12
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 303.482
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. --
|