LEADER 00000cam a2200853 a 4500 001 895288472 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 141114s2015 maua o 001 0 eng d 019 893740539|a1058769734|a1097118172|a1295595308|a1300609546 |a1303329493 020 9780128014684 020 0128014687 020 0128013087 020 9780128013083 029 1 AU@|b000054998643 029 1 CHNEW|b001012543 029 1 DEBBG|bBV042490203 029 1 DEBBG|bBV043613152 029 1 DEBSZ|b431803196 029 1 DEBSZ|b434138681 029 1 DEBSZ|b434833835 035 (OCoLC)895288472|z(OCoLC)893740539|z(OCoLC)1058769734 |z(OCoLC)1097118172|z(OCoLC)1295595308|z(OCoLC)1300609546 |z(OCoLC)1303329493 037 CL0500000502|bSafari Books Online 040 UMI|beng|epn|cUMI|dE7B|dUIU|dWAU|dOCLCF|dDEBBG|dB24X7|dSTF |dCOO|dOCLCO|dDEBSZ|dEBLCP|dN$T|dYDXCP|dSFB|dOCLCO|dOCLCQ |dOCLCO|dOCLCQ|dLIV|dMERUC|dU3W|dD6H|dCEF|dCNO|dOCLCQ|dCUY |dLOA|dZCU|dG3B|dCNCEN|dS8J|dICG|dK6U|dCOCUF|dCNNOR|dDKC |dAU@|dOCLCQ|dVT2|dOCLCQ|dBRF|dCZL|dDST|dOCLCO|dOCLCQ |dOCLCO 049 INap 082 04 327.12 082 04 327.12|223 099 eBook O'Reilly for Public Libraries 100 1 Shimonski, Robert,|eauthor. 245 10 Cyber reconnaissance surveillance and defense /|cRobert Shimonski.|h[O'Reilly electronic resource] 260 Waltham, MA :|bSyngress,|c©2015. 300 1 online resource (xiv, 240 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file 500 Includes index. 505 0 Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester. 505 8 Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking. 505 8 Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance. 505 8 Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home). 505 8 Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods. 520 Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- |cEdited summary from book. 546 English. 588 0 Online resource; title from title page (Safari, viewed November 7, 2014). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Electronic intelligence. 650 0 Internet in espionage. 650 0 Cyber intelligence (Computer security) 650 0 Internet|xSecurity measures. 650 0 Computer crimes. 650 6 Renseignement électronique. 650 6 Internet dans l'espionnage. 650 6 Surveillance des menaces informatiques. 650 6 Internet|xSécurité|xMesures. 650 6 Criminalité informatique. 650 7 Computer crimes|2fast 650 7 Cyber intelligence (Computer security)|2fast 650 7 Electronic intelligence|2fast 650 7 Internet in espionage|2fast 650 7 Internet|xSecurity measures|2fast 776 08 |iPrint version:|aShimonski, Robert.|tCyber reconnaissance, surveillance, and defense.|dWaltham, MA, USA : Syngress is an imprint of Elsevier, [2015]|z9780128013083|w(DLC) 2014031815 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780128013083/?ar |zAvailable on O'Reilly for Public Libraries 938 Books 24x7|bB247|nbks00077730 938 EBL - Ebook Library|bEBLB|nEBL1820202 938 ebrary|bEBRY|nebr10958564 938 EBSCOhost|bEBSC|n876786 938 YBP Library Services|bYANK|n12130477 994 92|bJFN