Cyber Reconnaissance, Surveillance and Defense
Autor Robert Shimonskien Limba Engleză Paperback – 21 oct 2014
Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
- Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
- Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
- Learn how to thwart monitoring and surveillance threats with practical tools and techniques
- Real-world examples teach using key concepts from cases in the news around the world
Preț: 262.96 lei
Preț vechi: 344.53 lei
-24% Nou
Puncte Express: 394
Preț estimativ în valută:
50.32€ • 52.94$ • 41.66£
50.32€ • 52.94$ • 41.66£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128013083
ISBN-10: 0128013087
Pagini: 258
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 13 mm
Greutate: 0.54 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128013087
Pagini: 258
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 13 mm
Greutate: 0.54 kg
Editura: ELSEVIER SCIENCE
Cuprins
Chapter 1: Digital Reconnaissance
Chapter 2: Information Gathering
Chapter 3: Social Engineering
Chapter 4: Mobile Phone Tracking
Chapter 5: Physical Device Tracking
Chapter 6: Web Camera Tracking
Chapter 7: Data Capture and Exploitation
Chapter 8: Protection Methods
Chapter 2: Information Gathering
Chapter 3: Social Engineering
Chapter 4: Mobile Phone Tracking
Chapter 5: Physical Device Tracking
Chapter 6: Web Camera Tracking
Chapter 7: Data Capture and Exploitation
Chapter 8: Protection Methods
Recenzii
"...an easy-to-read and informative book that can help the general public improve their awareness of cyberthreats and risk-mitigation approaches." --Computing Reviews