| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910788136303321 |
|
|
Autore |
Chauhan Sudhanshu |
|
|
Titolo |
Hacking web intelligence : open source intelligence and web reconnaissance concepts and techniques / / Sudhanshu Chauhan, Nutan Kumar Panda |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam, [Netherlands] : , : Syngress, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (301 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
World Wide Web |
Open source intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 - Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 - Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE |
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 - Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 - Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 - Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 - OSINT Tools and Techniques; INTRODUCTION; |
|
|
|
|
|
|
|
|
|
|
|
CREEPY |
THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 - Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 - Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 - Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 - Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 - Online Security; INTRODUCTION; MALWARES; PHISHING |
ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 - Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 - Quick and Dirty Python; INTRODUCTION; Chapter 14 - Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 - Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY |
DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910337625303321 |
|
|
Autore |
Sethi Rajandrea |
|
|
Titolo |
Groundwater Engineering : A Technical Approach to Hydrogeology, Contaminant Transport and Groundwater Remediation / / by Rajandrea Sethi, Antonio Di Molfetta |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XXI, 439 p. 240 illus., 9 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Springer Tracts in Civil Engineering , , 2366-259X |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Engineering geology |
Engineering—Geology |
Foundations |
Hydraulics |
Hydrology |
Geotechnical engineering |
Hydrogeology |
Geoengineering, Foundations, Hydraulics |
Hydrology/Water Resources |
Geotechnical Engineering & Applied Earth Sciences |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Basic Concepts -- Theoretical foundations of the groundwater flow equation -- Analytical solutions of the groundwater flow equation in a polar coordinate system -- Aquifer characterization -- Specific capacity and well efficiency -- Optimization of the productive capacity of a water supply system -- Aquifer vulnerability and contamination risk -- Definition of protection areas of drinking water sources -- Groundwater contaminants -- Mechanisms of contaminant propagation in aquifers -- Theoretical foundations of the di↵erential equations of mass transport -- Analytical solutions to the di↵erential equation of mass transport for conservative solutes -- Analytical solutions of the di↵erential equation of mass transport for reactive solutes -- Transport of immiscible substances -- Characterization of a |
|
|
|
|
|
|
|
|
|
|
|
contamination event -- Human health risk assessment -- Remediation of contaminated groundwater -- Appendices. |
|
|
|
|
|
|
Sommario/riassunto |
|
This textbook employs a technical and quantitative approach to explain subsurface hydrology and hydrogeology, and to offer a comprehensive overview of groundwater-related topics such as flow in porous media, aquifer characterization, contaminant description and transport, risk assessment, and groundwater remediation. It describes the characterization of subsurface flow of pristine and polluted water and provides readers with easily applicable tools for the design of water supply systems, drinking-water source protection, and remediation interventions. Specific applications range from groundwater exploitation as a drinking water supply to the remediation of contaminated aquifers, from the definition and safeguarding of drinking-water sources to the assessment of human health risks in connection with groundwater contamination events. The book represents an ideal learning resource for upper-undergraduate and graduate students of civil engineering, environmental engineering, and geology, as well as practitioners in the fields of water resource management and environmental protection who are interested in groundwater engineering and technical hydrogeology. |
|
|
|
|
|
|
|
| |