Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200997 i 4500 
001    907467285 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    150416s2015    maua    o     001 0 eng d 
015    GBB552821|2bnb 
016 7  017166213|2Uk 
019    908073540|a909802687|a915731918|a1117872723|a1125089872
       |a1162228914|a1227641720|a1229313938|a1287177805 
020    9780128019122|q(electronic bk.) 
020    0128019123|q(electronic bk.) 
020    0128018674 
020    9780128018675 
029 1  AU@|b000054965735 
029 1  CHBIS|b010547806 
029 1  CHNEW|b001012846 
029 1  CHVBK|b341780138 
029 1  DEBBG|bBV042683448 
029 1  DEBSZ|b446586528 
029 1  GBVCP|b82592667X 
029 1  NZ1|b16241451 
029 1  UKMGB|b017166213 
035    (OCoLC)907467285|z(OCoLC)908073540|z(OCoLC)909802687
       |z(OCoLC)915731918|z(OCoLC)1117872723|z(OCoLC)1125089872
       |z(OCoLC)1162228914|z(OCoLC)1227641720|z(OCoLC)1229313938
       |z(OCoLC)1287177805 
037    CL0500000592|bSafari Books Online 
040    N$T|beng|erda|epn|cN$T|dN$T|dOPELS|dE7B|dYDXCP|dUMI|dIDEBK
       |dCDX|dCOO|dDEBBG|dEBLCP|dB24X7|dOCLCF|dIDB|dZ5A|dVGM|dLIV
       |dOCLCQ|dMERUC|dOCLCQ|dUPM|dWRM|dU3W|dD6H|dCEF|dOCLCQ|dCUY
       |dLOA|dG3B|dCNCEN|dS8J|dICG|dK6U|dCOCUF|dCNNOR|dVT2|dDCT
       |dUKMGB|dOCLCQ|dSFB|dVLY|dHS0|dLVT|dS2H|dOCLCO|dOCLCQ
       |dOCLCO 
049    INap 
082 04 004.678 
082 04 004.678|223 
099    eBook O'Reilly for Public Libraries 
100 1  Chauhan, Sudhanshu,|eauthor. 
245 10 Hacking web intelligence :|bopen source intelligence and 
       web reconnaissance concepts and techniques /|cSudhanshu 
       Chauhan, Nutan Kumar Panda.|h[O'Reilly electronic 
       resource] 
264  1 Waltham, MA :|bSyngress, an imprint of Elsevier,|c2015. 
264  4 |c©2015 
300    1 online resource :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Includes index. 
505 0  Front Cover; Hacking Web Intelligence: Open Source 
       Intelligence and Web Reconnaissance Concepts and 
       Techniques; Copyright; Contents; Preface; WHAT THIS BOOK 
       COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; 
       About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; 
       Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; 
       Chapter 1 -- Foundation: Understanding the Basics; 
       INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC
       TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; 
       Chapter 2 -- Open Source Intelligence and Advanced Social 
       Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE. 
505 8  HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA 
       INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES 
       FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 -- 
       Understanding Browsers and Beyond; INTRODUCTION; BROWSER 
       OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; 
       BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN 
       CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY 
       BROWSERS; Chapter 4 -- Search the Web-Beyond Convention; 
       INTRODUCTION; Chapter 5 -- Advanced Web Searching; 
       INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 -- 
       OSINT Tools and Techniques; INTRODUCTION; CREEPY. 
505 8  THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; 
       Chapter 7 -- Metadata; INTRODUCTION; METADATA EXTRACTION 
       TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 -- 
       Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE 
       NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 -- 
       Deepweb: Exploring the Darkest Corners of the Internet; 
       INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET 
       SERVICES; DISCLAIMER; Chapter 10 -- Data Management and 
       Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS 
       TOOLS; Chapter 11 -- Online Security; INTRODUCTION; 
       MALWARES; PHISHING. 
505 8  ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; 
       SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY 
       PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER 
       APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; 
       PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; 
       DATA ENCRYPTION; Chapter 12 -- Basics of Social Networks 
       Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE 
       ATTRIBUTES; Chapter 13 -- Quick and Dirty Python; 
       INTRODUCTION; Chapter 14 -- Case Studies and Examples; 
       INTRODUCTION; CASE STUDIES; Chapter 15 -- Related Topics 
       of Interest; INTRODUCTION; CRYPTOGRAPHY. 
505 8  DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; 
       Index. 
520    Open source intelligence (OSINT) and web reconnaissance 
       are rich topics for infosec professionals looking for the 
       best ways to sift through the abundance of information 
       widely available online. In many cases, the first stage of
       any security assessment-that is, reconnaissance-is not 
       given enough attention by security professionals, hackers,
       and penetration testers. Often, the information openly 
       present is as critical as the confidential data. Hacking 
       Web Intelligence shows you how to dig into the Web and 
       uncover the information many don't even know exists. The 
       book takes a holistic approach that is not only about 
       using tools to find information online but also how to 
       link all the information and transform it into presentable
       and actionable intelligence. You will also learn how to 
       secure your information online to prevent it being 
       discovered by these reconnaissance methods. Hacking Web 
       Intelligence is an in-depth technical reference covering 
       the methods and techniques you need to unearth open source
       information from the Internet and utilize it for the 
       purpose of targeted attack during a security assessment. 
       This book will introduce you to many new and leading-edge 
       reconnaissance, information gathering, and open source 
       intelligence methods and techniques, including metadata 
       extraction tools, advanced search engines, advanced 
       browsers, power searching methods, online anonymity tools 
       such as TOR and i2p, OSINT tools such as Maltego, Shodan, 
       Creepy, SearchDiggity, Recon-ng, Social Network Analysis 
       (SNA), Darkweb/Deepweb, data visualization, and much more.
546    English. 
588 0  Vendor-supplied metadata. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 World Wide Web. 
650  0 Open source intelligence. 
650  0 Computer networks|xSecurity measures. 
650  6 Web. 
650  6 Renseignements de sources ouvertes. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  7 World Wide Web.|2aat 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Open source intelligence|2fast 
650  7 World Wide Web|2fast 
700 1  Panda, Nutan Kumar,|eauthor. 
776 08 |iPrint version:|aChauhan, Sudhanshu.|tHacking web 
       intelligence : open source intelligence and web 
       reconnaissance concepts and techniques.|dAmsterdam, 
       [Netherlands] : Syngress, ©2015|hxvii, 281 pages
       |z9780128018675 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780128018675/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Books 24x7|bB247|nbks00088814 
938    Coutts Information Services|bCOUT|n31427963 
938    EBL - Ebook Library|bEBLB|nEBL2025500 
938    ebrary|bEBRY|nebr11043523 
938    EBSCOhost|bEBSC|n979488 
938    ProQuest MyiLibrary Digital eBook Collection|bIDEB
       |ncis31427963 
938    YBP Library Services|bYANK|n12384137 
994    92|bJFN