Cyber Reconnaissance, Surveillance and Defense:
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defen...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizationsFind out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillanceLearn how to thwart monitoring and surveillance threats with practical tools and techniquesReal-world examples teach using key concepts from cases in the news around the world |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (258 pages) |
ISBN: | 9780128014684 9780128013083 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043613152 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128014684 |9 978-0-12-801468-4 | ||
020 | |a 9780128013083 |c Print |9 978-0-12-801308-3 | ||
035 | |a (ZDB-30-PQE)EBC1820202 | ||
035 | |a (ZDB-89-EBL)EBL1820202 | ||
035 | |a (ZDB-38-EBR)ebr10958564 | ||
035 | |a (OCoLC)895288472 | ||
035 | |a (DE-599)BVBBV043613152 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 327.12 | |
100 | 1 | |a Shimonski, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Reconnaissance, Surveillance and Defense |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (258 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizationsFind out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillanceLearn how to thwart monitoring and surveillance threats with practical tools and techniquesReal-world examples teach using key concepts from cases in the news around the world | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Electronic intelligence | |
650 | 4 | |a Internet -- Security measures | |
650 | 4 | |a Internet in espionage | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Shimonski, Robert |t Cyber Reconnaissance, Surveillance and Defense |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029027211 |
Datensatz im Suchindex
_version_ | 1804176356953554944 |
---|---|
any_adam_object | |
author | Shimonski, Robert |
author_facet | Shimonski, Robert |
author_role | aut |
author_sort | Shimonski, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | BV043613152 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1820202 (ZDB-89-EBL)EBL1820202 (ZDB-38-EBR)ebr10958564 (OCoLC)895288472 (DE-599)BVBBV043613152 |
dewey-full | 327.12 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.12 |
dewey-search | 327.12 |
dewey-sort | 3327.12 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02796nmm a2200421zc 4500</leader><controlfield tag="001">BV043613152</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128014684</subfield><subfield code="9">978-0-12-801468-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128013083</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-801308-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1820202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1820202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10958564</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)895288472</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043613152</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.12</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shimonski, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Reconnaissance, Surveillance and Defense</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (258 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizationsFind out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillanceLearn how to thwart monitoring and surveillance threats with practical tools and techniquesReal-world examples teach using key concepts from cases in the news around the world</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet in espionage</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Shimonski, Robert</subfield><subfield code="t">Cyber Reconnaissance, Surveillance and Defense</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029027211</subfield></datafield></record></collection> |
id | DE-604.BV043613152 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:53Z |
institution | BVB |
isbn | 9780128014684 9780128013083 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029027211 |
oclc_num | 895288472 |
open_access_boolean | |
physical | 1 online resource (258 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Shimonski, Robert Verfasser aut Cyber Reconnaissance, Surveillance and Defense Saint Louis Elsevier Science 2014 © 2015 1 online resource (258 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizationsFind out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillanceLearn how to thwart monitoring and surveillance threats with practical tools and techniquesReal-world examples teach using key concepts from cases in the news around the world Computer crimes Cyber intelligence (Computer security) Electronic intelligence Internet -- Security measures Internet in espionage Erscheint auch als Druck-Ausgabe Shimonski, Robert Cyber Reconnaissance, Surveillance and Defense |
spellingShingle | Shimonski, Robert Cyber Reconnaissance, Surveillance and Defense Computer crimes Cyber intelligence (Computer security) Electronic intelligence Internet -- Security measures Internet in espionage |
title | Cyber Reconnaissance, Surveillance and Defense |
title_auth | Cyber Reconnaissance, Surveillance and Defense |
title_exact_search | Cyber Reconnaissance, Surveillance and Defense |
title_full | Cyber Reconnaissance, Surveillance and Defense |
title_fullStr | Cyber Reconnaissance, Surveillance and Defense |
title_full_unstemmed | Cyber Reconnaissance, Surveillance and Defense |
title_short | Cyber Reconnaissance, Surveillance and Defense |
title_sort | cyber reconnaissance surveillance and defense |
topic | Computer crimes Cyber intelligence (Computer security) Electronic intelligence Internet -- Security measures Internet in espionage |
topic_facet | Computer crimes Cyber intelligence (Computer security) Electronic intelligence Internet -- Security measures Internet in espionage |
work_keys_str_mv | AT shimonskirobert cyberreconnaissancesurveillanceanddefense |