Description |
1 online resource |
Note |
Includes index. |
Contents |
Protecting sources and yourself -- Acquiring datasets -- The command line interface -- Exploring datasets in the terminal -- Docker, Aleph, and making datasets searchable -- Reading other people's email -- An introduction to Python -- Working with data in Python -- BlueLeaks, Black Lives Matter, and the CSV file format -- BlueLeaks Explorer -- Parler, the January 6 insurrection, and the JSON file format -- Epik fail, extremism research, and SQL Databases -- Pandemic profiteers and COVID-19 disinformation -- Neo-Nazis and their chat rooms. |
Summary |
"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"-- Provided by publisher. |
Subject |
Quantitative research -- Data processing.
|
|
Journalism -- Data processing.
|
|
Data mining.
|
|
Hacking.
|
|
Recherche quantitative -- Informatique. |
|
Journalisme -- Informatique. |
|
Exploration de données (Informatique) |
|
Piratage informatique. |
Other Form: |
Print version: Lee, Micah. Hacks, leaks, and revelations San Francisco, CA : No Starch Press, 2024 9781718503120 (DLC) 2023024888 |
ISBN |
171850313X |
|
9781718503137 (electronic bk.) |
|
(paperback) |
|