【2014新书】 Cyber reconnaissance, surveillance, and defense
Book 图书名称:Cyber reconnaissance, surveillance, and defense
Author 作者: Robert Shimonski
Publisher 出版社:Elsevier/Syngress
Page 页数:246
Publishing Date 出版时间:Oct, 2014
Language 语言:English
Size 大小:25 MB
Format 格式:pdf 文字版
ISBN:978-0-12-801308-3, 0128013087
Edition: 第1版 搜索过论坛,没有该文档
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.
Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizationsFind out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillanceLearn how to thwart monitoring and surveillance threats with practical tools and techniquesReal-world examples teach using key concepts from cases in the news around the world
== Table of contents ==
Content:
Front matter, Page iii
Copyright, Page iv
Dedication, Page v
About the Authors, Pages ix-x
Acknowledgments, Page xi
Introduction, Pages xiii-xv
Chapter 1 - Digital Reconnaissance and Surveillance, Pages 1-44
Chapter 2 - Information Gathering, Pages 45-84
Chapter 3 - Social Engineering, Pages 85-112
Chapter 4 - Mobile Phone Tracking, Pages 113-143
Chapter 5 - Physical Device Tracking, Pages 145-160
Chapter 6 - Web Camera and Video Tracking, Pages 161-181
Chapter 7 - Data Capture and Exploitation, Pages 183-215
Chapter 8 - Protection Methods, Pages 217-235
Index, Pages 237-241