語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Open source intelligence methods and...
~
Hassan, Nihad A.
Open source intelligence methods and toolsa practical guide to online intelligence /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Open source intelligence methods and toolsby Nihad A. Hassan, Rami Hijazi.
其他題名:
a practical guide to online intelligence /
作者:
Hassan, Nihad A.
其他作者:
Hijazi, Rami.
出版者:
Berkeley, CA :Apress :2018.
面頁冊數:
xxiii, 354 p. :digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer security.
電子資源:
http://dx.doi.org/10.1007/978-1-4842-3213-2
ISBN:
9781484232132$q(electronic bk.)
Open source intelligence methods and toolsa practical guide to online intelligence /
Hassan, Nihad A.
Open source intelligence methods and tools
a practical guide to online intelligence /[electronic resource] :by Nihad A. Hassan, Rami Hijazi. - Berkeley, CA :Apress :2018. - xxiii, 354 p. :digital ;24 cm.
Chapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Next?
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs.
ISBN: 9781484232132$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-3213-2doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / H377 2018
Dewey Class. No.: 005.8
Open source intelligence methods and toolsa practical guide to online intelligence /
LDR
:03779nmm a2200289 a 4500
001
540931
003
DE-He213
005
20190115113534.0
006
m d
007
cr nn 008maaau
008
190308s2018 cau s 0 eng d
020
$a
9781484232132$q(electronic bk.)
020
$a
9781484232125$q(paper)
024
7
$a
10.1007/978-1-4842-3213-2
$2
doi
035
$a
978-1-4842-3213-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H377 2018
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H353 2018
100
1
$a
Hassan, Nihad A.
$3
789889
245
1 0
$a
Open source intelligence methods and tools
$h
[electronic resource] :
$b
a practical guide to online intelligence /
$c
by Nihad A. Hassan, Rami Hijazi.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2018.
300
$a
xxiii, 354 p. :
$b
digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Next?
520
$a
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs.
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Open source software.
$3
200208
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Security.
$3
760527
700
1
$a
Hijazi, Rami.
$3
789890
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-3213-2
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000160688
電子館藏
1圖書
電子書
EB QA76.9.A25 H353 2018 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-1-4842-3213-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入