05597nam 2200733 450 991082906400332120200520144314.00-12-801468-7(CKB)3710000000264434(EBL)1820202(SSID)ssj0001349773(PQKBManifestationID)12619236(PQKBTitleCode)TC0001349773(PQKBWorkID)11402791(PQKB)11366434(Au-PeEL)EBL1820202(CaPaEBR)ebr10958564(CaONFJC)MIL657039(OCoLC)895288472(CaSebORM)9780128013083(MiAaPQ)EBC1820202(EXLCZ)99371000000026443420141106h20152015 uy 0engur|n|---|||||txtccrCyber reconnaissance, surveillance, and defense /Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor1st editionWaltham, Massachusetts :Syngress,2015.©20151 online resource (258 p.)Includes index.1-322-25759-0 0-12-801308-7 Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration TesterPrivate InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and StalkingSocial EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for ReconnaissanceLocation-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection MethodsProtect Yourself! At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describElectronic intelligenceInternet in espionageCyber intelligence (Computer security)InternetSecurity measuresComputer crimesElectronic intelligence.Internet in espionage.Cyber intelligence (Computer security)InternetSecurity measures.Computer crimes.327.12Shimonski Robert627583Zenir JohnBishop AllisonMiAaPQMiAaPQMiAaPQBOOK9910829064003321Cyber reconnaissance, surveillance, and defense4113331UNINA02980oam 22006014a 450 991030665450332120240528210412.09789971696597997169659210.2307/j.ctv1qv3fh(CKB)3400000000127704(SSID)ssj0000851525(PQKBManifestationID)11966613(PQKBTitleCode)TC0000851525(PQKBWorkID)10849409(PQKB)10013905(OCoLC)830023217(MdBmJHUP)muse18787(MiAaPQ)EBC5718198(ScCtBLL)954e8fb6-ced5-4ee2-b54a-ea1189c7f798(oapen)https://directory.doabooks.org/handle/20.500.12854/31928(Perlego)2329176(oapen)doab31928(EXLCZ)99340000000012770420120412d2012 uy 0engur|||||||nn|ntxtrdacontentcrdamediacrrdacarrierIslamisation and Its Opponents in JavaA Political, Social, Cultural and Religious History, c. 1930 to Present /M.C. RicklefsSingaporeNational University of Singapore Press2012Singapore :NUS Press,2012©20121 online resource (1 online resource (xxi, 576 pages) :)illustrations (some color), map, portraits"First published by NUS Press, National University of Singapore."9789971696313 9971696312 Includes bibliographical references and index.The Javanese - one of the largest ethnic groups in the Islamic world - were once mostly 'nominal Muslims' with pious believers a minority and the majority seemingly resistant to Islam's call for greater piety. Over the tumultuous period analyzed here - from the 1930s to the 2000s - that society has changed profoundly to become an extraordinary example of the rising religiosity that marks the modern age. Islamisation and Its Opponents in Java draws on a formidable body of sources, including interviews, archival documents and a vast range of published material, to situate the Javanese religious experience. Winner of the Kahin Prize from the Association of Asia Studies, the study has considerable relevance for much wider contexts. The final section of the book, which considers the significance of Java's religious history in global contexts, shows how it exemplifies a profound contest of values in the universal human search for a better life.IslamIndonesiaJavaJava (Indonesia)HistoryJava (Indonesia)ReligionIslam297.095982Ricklefs M. C(Merle Calvin)637681Project Muse,MdBmJHUPMdBmJHUPBOOK9910306654503321Islamisation and Its Opponents in Java4159429UNINA