Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Conti, Greg.

Title Googling security : how much does Google know about you? / Greg Conti. [O'Reilly electronic resource]

Imprint Upper Saddle River, N.J. : Addison-Wesley, ©2009.
QR Code
Description 1 online resource (xxi, 332 pages) : illustrations, maps
text file
Bibliography Includes bibliographical references and index.
Contents Googling -- Information flows and leakage -- Footprints, fingerprints, and connections -- Search -- Communications -- Mapping, directions, and imagery -- Advertising and embedded content -- Googlebot -- Countermeasures -- Conclusions and a look to the future.
Access Use copy Restrictions unspecified star MiAaHDL
Reproduction Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL
System Details Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Processing Action digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Summary What Does Google Know about You? And Who Are They Telling? When you use Google's "free" services, you pay, big time-with personal information about yourself. Google is making a fortune on what it knows about you ... and you may be shocked by just how much Google does know. Googling Security is the first book to reveal how Google's vast information stockpiles could be used against you or your business-and what you can do to protect yourself. Unlike other books on Google hacking, this book covers information you disclose when using all of Google's top applications, not just what savvy users can retrieve via Google's search results. West Point computer science professor Greg Conti reveals the privacy implications of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts, Google's new mobile applications, and more. Drawing on his own advanced security research, Conti shows how Google's databases can be used by others with bad intent, even if Google succeeds in its pledge of "don't be evil." Uncover the trail of informational "bread crumbs" you leave when you use Google search How Gmail could be used to track your personal network of friends, family, and acquaintances How Google's map and location tools could disclose the locations of your home, employer, family and friends, travel plans, and intentions How the information stockpiles of Google and other online companies may be spilled, lost, taken, shared, or subpoenaed and later used for identity theft or even blackmail How the Google AdSense and DoubleClick advertising services could track you around the Web How to systematically reduce the personal information you expose or give away This book is a wake-up call and a "how-to" self-defense manual: an indispensable resource for everyone, from private citizens to security professionals, who relies on Google. Preface xiii Acknowledgments xix About the Author xxi Chapter 1: Googling 1 Chapter 2: Information Flows and Leakage 31 Chapter 3: Footprints, Fingerprints, and Connections 59 Chapter 4: Search 97 Chapter 5: Communications 139 Chapter 6: Mapping, Directions, and Imagery 177 Chapter 7: Advertising and Embedded Content 205 Chapter 8: Googlebot 239 Chapter 9: Countermeasures 259 Chapter 10: Conclusions and a Look to the Future 299 Index 317
Processing Action Self-Renewing 2018 UoY
Subject Google.
Google (Firm)
Google (Firm)
Google.
Google (Firm)
Google
Google LLC
Computer security.
Computer networks -- Security measures.
Computer Security
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer security.
Computer networks -- Security measures.
Computer networks -- Security measures
Computer security
Google
Computersicherheit
Rechnernetz
IT-säkerhet.
Internet -- säkerhetsaspekter.
Google.
Sicherheitsmassnahme.
Other Form: Print version: Conti, Greg. Googling security. 1st ed. Upper Saddle River, NJ : Addison-Wesley Professional, 2008 0321518667 (DLC) 2008032687 (OCoLC)822886546
ISBN 9780321591265
0321591267
9780132701990 (e-book)
0132701995
(pbk. ; alk. paper)
(pbk. ; alk. paper)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information