Cantitate/Preț
Produs

Cyber Reconnaissance, Surveillance and Defense

Autor Robert Shimonski
en Limba Engleză Paperback – 21 oct 2014
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.
Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.


  • Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
  • Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
  • Learn how to thwart monitoring and surveillance threats with practical tools and techniques
  • Real-world examples teach using key concepts from cases in the news around the world
Citește tot Restrânge

Preț: 26296 lei

Preț vechi: 34453 lei
-24% Nou

Puncte Express: 394

Preț estimativ în valută:
5032 5294$ 4166£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780128013083
ISBN-10: 0128013087
Pagini: 258
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 13 mm
Greutate: 0.54 kg
Editura: ELSEVIER SCIENCE

Cuprins

Chapter 1: Digital Reconnaissance
Chapter 2: Information Gathering
Chapter 3: Social Engineering
Chapter 4: Mobile Phone Tracking
Chapter 5: Physical Device Tracking
Chapter 6: Web Camera Tracking
Chapter 7: Data Capture and Exploitation
Chapter 8: Protection Methods

Recenzii

"...an easy-to-read and informative book that can help the general public improve their awareness of cyberthreats and risk-mitigation approaches." --Computing Reviews

Notă biografică