Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200853 a 4500 
001    895288472 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    141114s2015    maua    o     001 0 eng d 
019    893740539|a1058769734|a1097118172|a1295595308|a1300609546
       |a1303329493 
020    9780128014684 
020    0128014687 
020    0128013087 
020    9780128013083 
029 1  AU@|b000054998643 
029 1  CHNEW|b001012543 
029 1  DEBBG|bBV042490203 
029 1  DEBBG|bBV043613152 
029 1  DEBSZ|b431803196 
029 1  DEBSZ|b434138681 
029 1  DEBSZ|b434833835 
035    (OCoLC)895288472|z(OCoLC)893740539|z(OCoLC)1058769734
       |z(OCoLC)1097118172|z(OCoLC)1295595308|z(OCoLC)1300609546
       |z(OCoLC)1303329493 
037    CL0500000502|bSafari Books Online 
040    UMI|beng|epn|cUMI|dE7B|dUIU|dWAU|dOCLCF|dDEBBG|dB24X7|dSTF
       |dCOO|dOCLCO|dDEBSZ|dEBLCP|dN$T|dYDXCP|dSFB|dOCLCO|dOCLCQ
       |dOCLCO|dOCLCQ|dLIV|dMERUC|dU3W|dD6H|dCEF|dCNO|dOCLCQ|dCUY
       |dLOA|dZCU|dG3B|dCNCEN|dS8J|dICG|dK6U|dCOCUF|dCNNOR|dDKC
       |dAU@|dOCLCQ|dVT2|dOCLCQ|dBRF|dCZL|dDST|dOCLCO|dOCLCQ
       |dOCLCO 
049    INap 
082 04 327.12 
082 04 327.12|223 
099    eBook O'Reilly for Public Libraries 
100 1  Shimonski, Robert,|eauthor. 
245 10 Cyber reconnaissance surveillance and defense /|cRobert 
       Shimonski.|h[O'Reilly electronic resource] 
260    Waltham, MA :|bSyngress,|c©2015. 
300    1 online resource (xiv, 240 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
500    Includes index. 
505 0  Cover; Title Page; Copyright Page; Dedication; Contents; 
       About the Authors; Acknowledgments; Introduction; Chapter 
       1 -- Digital Reconnaissance and Surveillance; Digital 
       Reconnaissance and Surveillance; Art and History of 
       Spying; Threat of Digital Reconnaissance and Surveillance;
       Threat Landscape; Why Spy?; NSA and Edward Snowden; Public
       Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? 
       Reward; Digital Forensics; Who Spies?; Professional Roles;
       Hackers (White, Gray, and Black); Digital Forensics 
       Examiner; Cyber Intelligence Analyst; Cyber Security 
       Engineer; Penetration Tester. 
505 8  Private InvestigatorLaw Enforcement; Legal and Ethical 
       Principles; Ethics; The Law; Surveillance and Cybercrime 
       Sample Law; Summary; Chapter 2 -- Information Gathering; 
       Information Gathering; Am I Being Spied On?; How Private 
       Is Your Life?; Examples of Privacy Invasion; How to Gather
       Information; Information Gathering Tools; Online 
       Reconnaissance; The Internet Threat; Search Engines; 
       Phishing; Tracking; Social Media; Scanning, Sniffing, and 
       Mapping; Wired and Wireless; Infrastructure; Mobile Device
       Threat; Data Threat (Metadata); Physical Reconnaissance; 
       Tailing and Stalking. 
505 8  Social EngineeringTapping; Legal and Ethical Concerns; 
       Summary; Chapter 3 -- Social Engineering; Social 
       Engineering; Am I Being Spied On?; Scam Example; How to 
       Gather Information; Dumpster Diving; Shoulder Surfing; 
       Phishing; Social Engineering Toolkit; Bugging and 
       Recording; Mitigation of Social Engineering; Mitigate 
       Attack; Information Privacy; Legal and Ethical Concerns; 
       More Legal Issues; Summary; Chapter 4 -- Mobile Phone 
       Tracking; Phone Tracking; Mobile Phones; Apple iPhone; 
       Google Android; Windows Phone; Blackberry; Phone Tracking;
       Malicious Tracking; Tracking for Reconnaissance. 
505 8  Location-Based ServicesTracking a SIM; Global Positioning 
       System and Geolocation; Google Mapping; Legal and Ethical 
       Concerns; Summary; Chapter 5 -- Physical Device Tracking; 
       Physical Tracking; Device fingerprint; Tracking for 
       Reconnaissance Today; Application Installation Versus 
       Physical Device; Physical Device Tracking; Safe Devices 
       Used Against You; Location Tracking and Wearable 
       Technology; Legal and Ethical Concerns; Summary; Chapter 6
       -- Web Camera and Video Tracking; Camera Tracking; 
       Tracking examples; Security Surveillance Systems (Private 
       Home). 
505 8  Security Surveillance Systems (Businesses)Security 
       Surveillance Systems (Public); Satellite Surveillance 
       Systems; PC devices and webcams; Creepware; Mobile 
       Devices; Gaming Consoles; Legal and Ethical Concerns; 
       Summary; Chapter 7 -- Data Capture and Exploitation; Data 
       Threat; Data Theft and Surveillance; Basic Data Capture 
       Techniques; Data at Rest; Malware Protection; DLP 
       Software; Firewall Systems; Removable Media; Encryption 
       Protection; Data in Motion; Sniffers; Skimmers; Digital 
       Forensics; Devices and Applications; Legal and Ethical 
       Concerns; Summary; Chapter 8 -- Protection Methods. 
520    Shimonski shows you how to carry out advanced IT 
       surveillance and reconnaissance, describes when and how 
       these techniques are used, and provides a full legal 
       background for each threat. This book describes many new 
       and leading-edge surveillance, information-gathering, and 
       personal exploitation threats taking place today, 
       including Web cam breaches, home privacy systems, physical
       and logical tracking, phone tracking, picture metadata, 
       physical device tracking and geo-location, social media 
       security, identity theft, social engineering, sniffing, 
       and more. Real-world examples are examined using key 
       concepts from cases in the news around the world. --
       |cEdited summary from book. 
546    English. 
588 0  Online resource; title from title page (Safari, viewed 
       November 7, 2014). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Electronic intelligence. 
650  0 Internet in espionage. 
650  0 Cyber intelligence (Computer security) 
650  0 Internet|xSecurity measures. 
650  0 Computer crimes. 
650  6 Renseignement électronique. 
650  6 Internet dans l'espionnage. 
650  6 Surveillance des menaces informatiques. 
650  6 Internet|xSécurité|xMesures. 
650  6 Criminalité informatique. 
650  7 Computer crimes|2fast 
650  7 Cyber intelligence (Computer security)|2fast 
650  7 Electronic intelligence|2fast 
650  7 Internet in espionage|2fast 
650  7 Internet|xSecurity measures|2fast 
776 08 |iPrint version:|aShimonski, Robert.|tCyber reconnaissance,
       surveillance, and defense.|dWaltham, MA, USA : Syngress is
       an imprint of Elsevier, [2015]|z9780128013083|w(DLC)  
       2014031815 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780128013083/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Books 24x7|bB247|nbks00077730 
938    EBL - Ebook Library|bEBLB|nEBL1820202 
938    ebrary|bEBRY|nebr10958564 
938    EBSCOhost|bEBSC|n876786 
938    YBP Library Services|bYANK|n12130477 
994    92|bJFN