Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
127 results found. Sorted by relevance | date | title .
Author Shimonski, Robert, author.

Title Cyber reconnaissance surveillance and defense / Robert Shimonski.

Imprint Waltham, MA : Syngress, 2015.


Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource (xiv, 240 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Online resource; title from title page (Safari, viewed Nov. 7, 2014).
Includes index.
Summary Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- Edited summary from book.
Contents Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 -- Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester.
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 -- Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking.
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 -- Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 -- Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance.
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 -- Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 -- Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home).
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 -- Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 -- Protection Methods.
Subject Electronic intelligence.
Internet in espionage.
Cyber intelligence (Computer security)
Internet -- Security measures.
Computer crimes.
POLITICAL SCIENCE -- Government -- International.
POLITICAL SCIENCE -- International Relations -- General.
Computer crimes. (OCoLC)fst00872063
Cyber intelligence (Computer security) (OCoLC)fst01893401
Electronic intelligence. (OCoLC)fst00907316
Internet in espionage. (OCoLC)fst01739358
Internet -- Security measures. (OCoLC)fst01751426
Genre/Form Electronic books.
Other Form: Print version: Shimonski, Robert. Cyber reconnaissance, surveillance, and defense. Waltham, MA, USA : Syngress is an imprint of Elsevier, [2015] 9780128013083 (DLC) 2014031815
ISBN 9780128014684
Standard No. CHNEW 001012543
CHVBK 519302079
DEBBG BV042490203
DEBBG BV043613152
DEBSZ 431803196
DEBSZ 434138681
DEBSZ 434833835

Available items only