Open source intelligence techniques: resources for searching and analyzing online information
This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" wh...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[Charleston, South Carolina]
CCI Publishing
April 2015
|
Ausgabe: | Fourth edition |
Schlagworte: | |
Zusammenfassung: | This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content, Cell Phone Owner Information, Twitter GPS & Account Data, Hidden Photo GPS & Metadata, Deleted Websites & Posts, Website Owner Information, Alias Social Network Profiles, Additional User Accounts, Sensitive Documents & Photos, Live Streaming Social Content, IP Addresses of Users, Newspaper Archives & Scans, Social Content by Location, Private Email Addresses, Historical Satellite Imagery, Duplicate Copies of Photos, Local Personal Radio Frequencies, Compromised Email Information, Wireless Routers by Location, Hidden Mapping Applications, Complete Facebook Data, Free Investigative Software, Alternative Search Engines, Stolen Items for Sale, Unlisted Addresses, Unlisted Phone Numbers, Public Government Records, Document Metadata, Rental Vehicle Contracts, Online Criminal Activity |
Beschreibung: | Literaturangaben |
Beschreibung: | VI, 418 Seiten Illustrationen 24 cm |
ISBN: | 9781508636335 1508636338 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043715782 | ||
003 | DE-604 | ||
005 | 20170530 | ||
007 | t | ||
008 | 160811s2015 a||| |||| 00||| eng d | ||
020 | |a 9781508636335 |9 978-1-5086-3633-5 | ||
020 | |a 1508636338 |9 1-5086-3633-8 | ||
035 | |a (DE-599)BVBBV043715782 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M382 | ||
100 | 1 | |a Bazzell, Michael |e Verfasser |0 (DE-588)112809701X |4 aut | |
245 | 1 | 0 | |a Open source intelligence techniques |b resources for searching and analyzing online information |c Michael Bazzell |
250 | |a Fourth edition | ||
264 | 1 | |a [Charleston, South Carolina] |b CCI Publishing |c April 2015 | |
300 | |a VI, 418 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
520 | |a This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content, Cell Phone Owner Information, Twitter GPS & Account Data, Hidden Photo GPS & Metadata, Deleted Websites & Posts, Website Owner Information, Alias Social Network Profiles, Additional User Accounts, Sensitive Documents & Photos, Live Streaming Social Content, IP Addresses of Users, Newspaper Archives & Scans, Social Content by Location, Private Email Addresses, Historical Satellite Imagery, Duplicate Copies of Photos, Local Personal Radio Frequencies, Compromised Email Information, Wireless Routers by Location, Hidden Mapping Applications, Complete Facebook Data, Free Investigative Software, Alternative Search Engines, Stolen Items for Sale, Unlisted Addresses, Unlisted Phone Numbers, Public Government Records, Document Metadata, Rental Vehicle Contracts, Online Criminal Activity | ||
650 | 4 | |a Open source intelligence / United States | |
650 | 4 | |a Data mining in law enforcement / United States | |
650 | 4 | |a Computer security | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data mining in law enforcement |2 fast | |
650 | 7 | |a Open source intelligence |2 fast | |
650 | 0 | 7 | |a Open Source |0 (DE-588)4548264-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimdienst |0 (DE-588)4019737-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information Retrieval |0 (DE-588)4072803-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Personenbezogene Daten |0 (DE-588)4173908-5 |2 gnd |9 rswk-swf |
651 | 7 | |a United States |2 fast | |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Open Source |0 (DE-588)4548264-0 |D s |
689 | 0 | 1 | |a Information Retrieval |0 (DE-588)4072803-1 |D s |
689 | 0 | 2 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 3 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 4 | |a Personenbezogene Daten |0 (DE-588)4173908-5 |D s |
689 | 0 | 5 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 6 | |a Geheimdienst |0 (DE-588)4019737-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029127950 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176504358174720 |
---|---|
any_adam_object | |
author | Bazzell, Michael |
author_GND | (DE-588)112809701X |
author_facet | Bazzell, Michael |
author_role | aut |
author_sort | Bazzell, Michael |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV043715782 |
ctrlnum | (DE-599)BVBBV043715782 |
edition | Fourth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03678nam a2200577 c 4500</leader><controlfield tag="001">BV043715782</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170530 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160811s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781508636335</subfield><subfield code="9">978-1-5086-3633-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1508636338</subfield><subfield code="9">1-5086-3633-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043715782</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bazzell, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)112809701X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Open source intelligence techniques</subfield><subfield code="b">resources for searching and analyzing online information</subfield><subfield code="c">Michael Bazzell</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Charleston, South Carolina]</subfield><subfield code="b">CCI Publishing</subfield><subfield code="c">April 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 418 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content, Cell Phone Owner Information, Twitter GPS & Account Data, Hidden Photo GPS & Metadata, Deleted Websites & Posts, Website Owner Information, Alias Social Network Profiles, Additional User Accounts, Sensitive Documents & Photos, Live Streaming Social Content, IP Addresses of Users, Newspaper Archives & Scans, Social Content by Location, Private Email Addresses, Historical Satellite Imagery, Duplicate Copies of Photos, Local Personal Radio Frequencies, Compromised Email Information, Wireless Routers by Location, Hidden Mapping Applications, Complete Facebook Data, Free Investigative Software, Alternative Search Engines, Stolen Items for Sale, Unlisted Addresses, Unlisted Phone Numbers, Public Government Records, Document Metadata, Rental Vehicle Contracts, Online Criminal Activity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source intelligence / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining in law enforcement / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining in law enforcement</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source intelligence</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information Retrieval</subfield><subfield code="0">(DE-588)4072803-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Personenbezogene Daten</subfield><subfield code="0">(DE-588)4173908-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information Retrieval</subfield><subfield code="0">(DE-588)4072803-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Personenbezogene Daten</subfield><subfield code="0">(DE-588)4173908-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029127950</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | United States fast USA |
geographic_facet | United States USA |
id | DE-604.BV043715782 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:33:14Z |
institution | BVB |
isbn | 9781508636335 1508636338 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029127950 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | VI, 418 Seiten Illustrationen 24 cm |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | CCI Publishing |
record_format | marc |
spelling | Bazzell, Michael Verfasser (DE-588)112809701X aut Open source intelligence techniques resources for searching and analyzing online information Michael Bazzell Fourth edition [Charleston, South Carolina] CCI Publishing April 2015 VI, 418 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Literaturangaben This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content, Cell Phone Owner Information, Twitter GPS & Account Data, Hidden Photo GPS & Metadata, Deleted Websites & Posts, Website Owner Information, Alias Social Network Profiles, Additional User Accounts, Sensitive Documents & Photos, Live Streaming Social Content, IP Addresses of Users, Newspaper Archives & Scans, Social Content by Location, Private Email Addresses, Historical Satellite Imagery, Duplicate Copies of Photos, Local Personal Radio Frequencies, Compromised Email Information, Wireless Routers by Location, Hidden Mapping Applications, Complete Facebook Data, Free Investigative Software, Alternative Search Engines, Stolen Items for Sale, Unlisted Addresses, Unlisted Phone Numbers, Public Government Records, Document Metadata, Rental Vehicle Contracts, Online Criminal Activity Open source intelligence / United States Data mining in law enforcement / United States Computer security Computer security fast Data mining in law enforcement fast Open source intelligence fast Open Source (DE-588)4548264-0 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Geheimdienst (DE-588)4019737-2 gnd rswk-swf Information Retrieval (DE-588)4072803-1 gnd rswk-swf Personenbezogene Daten (DE-588)4173908-5 gnd rswk-swf United States fast USA Open Source (DE-588)4548264-0 s Information Retrieval (DE-588)4072803-1 s Internet (DE-588)4308416-3 s Sicherheit (DE-588)4054790-5 s Personenbezogene Daten (DE-588)4173908-5 s Data Mining (DE-588)4428654-5 s Geheimdienst (DE-588)4019737-2 s 1\p DE-604 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bazzell, Michael Open source intelligence techniques resources for searching and analyzing online information Open source intelligence / United States Data mining in law enforcement / United States Computer security Computer security fast Data mining in law enforcement fast Open source intelligence fast Open Source (DE-588)4548264-0 gnd Sicherheit (DE-588)4054790-5 gnd Internet (DE-588)4308416-3 gnd Data Mining (DE-588)4428654-5 gnd Geheimdienst (DE-588)4019737-2 gnd Information Retrieval (DE-588)4072803-1 gnd Personenbezogene Daten (DE-588)4173908-5 gnd |
subject_GND | (DE-588)4548264-0 (DE-588)4054790-5 (DE-588)4308416-3 (DE-588)4428654-5 (DE-588)4019737-2 (DE-588)4072803-1 (DE-588)4173908-5 |
title | Open source intelligence techniques resources for searching and analyzing online information |
title_auth | Open source intelligence techniques resources for searching and analyzing online information |
title_exact_search | Open source intelligence techniques resources for searching and analyzing online information |
title_full | Open source intelligence techniques resources for searching and analyzing online information Michael Bazzell |
title_fullStr | Open source intelligence techniques resources for searching and analyzing online information Michael Bazzell |
title_full_unstemmed | Open source intelligence techniques resources for searching and analyzing online information Michael Bazzell |
title_short | Open source intelligence techniques |
title_sort | open source intelligence techniques resources for searching and analyzing online information |
title_sub | resources for searching and analyzing online information |
topic | Open source intelligence / United States Data mining in law enforcement / United States Computer security Computer security fast Data mining in law enforcement fast Open source intelligence fast Open Source (DE-588)4548264-0 gnd Sicherheit (DE-588)4054790-5 gnd Internet (DE-588)4308416-3 gnd Data Mining (DE-588)4428654-5 gnd Geheimdienst (DE-588)4019737-2 gnd Information Retrieval (DE-588)4072803-1 gnd Personenbezogene Daten (DE-588)4173908-5 gnd |
topic_facet | Open source intelligence / United States Data mining in law enforcement / United States Computer security Data mining in law enforcement Open source intelligence Open Source Sicherheit Internet Data Mining Geheimdienst Information Retrieval Personenbezogene Daten United States USA |
work_keys_str_mv | AT bazzellmichael opensourceintelligencetechniquesresourcesforsearchingandanalyzingonlineinformation |