LEADER 05631nam 2200745 450 001 9910460221703321 005 20200520144314.0 010 $a0-12-801468-7 035 $a(CKB)3710000000264434 035 $a(EBL)1820202 035 $a(SSID)ssj0001349773 035 $a(PQKBManifestationID)12619236 035 $a(PQKBTitleCode)TC0001349773 035 $a(PQKBWorkID)11402791 035 $a(PQKB)11366434 035 $a(MiAaPQ)EBC1820202 035 $a(CaSebORM)9780128013083 035 $a(Au-PeEL)EBL1820202 035 $a(CaPaEBR)ebr10958564 035 $a(CaONFJC)MIL657039 035 $a(OCoLC)895288472 035 $a(EXLCZ)993710000000264434 100 $a20141106h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber reconnaissance, surveillance, and defense /$fRobert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (258 p.) 300 $aIncludes index. 311 $a1-322-25759-0 311 $a0-12-801308-7 327 $aCover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester 327 $aPrivate InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking 327 $aSocial EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance 327 $aLocation-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) 327 $aSecurity Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods 327 $aProtect Yourself! 330 $a At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ 606 $aElectronic intelligence 606 $aInternet in espionage 606 $aCyber intelligence (Computer security) 606 $aInternet$xSecurity measures 606 $aComputer crimes 608 $aElectronic books. 615 0$aElectronic intelligence. 615 0$aInternet in espionage. 615 0$aCyber intelligence (Computer security) 615 0$aInternet$xSecurity measures. 615 0$aComputer crimes. 676 $a327.12 700 $aShimonski$b Robert$0627583 702 $aZenir$b John 702 $aBishop$b Allison 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910460221703321 996 $aCyber reconnaissance, surveillance, and defense$92174389 997 $aUNINA LEADER 02656oam 2200289z- 450 001 9910160680103321 005 20230913112557.0 010 $a1-62210-119-7 035 $a(CKB)3710000001026369 035 $a(BIP)052335929 035 $a(Exl-AI)993710000001026369 035 $a(EXLCZ)993710000001026369 100 $a20210505c2014uuuu -u- - 101 0 $aeng 200 10$aDeception 210 $cLiquid Silver Books 215 $a1 online resource (240 p.) 330 8 $aHe is not who he appears to be ... but neither is she. Frankie Palmer is a seeker of justice, and by joining forces with black ops specialist Ethan Drake, she may finally be able to take down the drug lord that is terrorizing the innocent citizens of her community. Edie Jo Gibson takes you on a suspense-filled adventure in her new romance, Deception.Bartender by night, neighborhood hero by day. Frankie Palmer is no stranger to seeking justice on criminals terrorizing innocent civilians. After all, she owns a bar called Retribution, and has an agenda for finding the drug lord responsible for putting her brother in a coma. Utilizing social networks, Frankie and her team of community members protect their own.Six years ago, military strategist and leader of a black ops unit Ethan Drake nearly captured Christian Briggs, a world-renowned drug dealer and arms trader. But the criminal eluded him during a disastrous operation, resulting in the death of Ethan's brother, an act Ethan has never recovered from, vowing to bring Briggs to justice. Frankie shows up in the crosshairs of Ethan's scope while she is on the trail of an identity thief wiping out accounts of elderly community members. The thief stole the identity of Christian Briggs, raising red flags and attracting Ethan.Both teams reluctantly band together to bring down Briggs. Even though Ethan believes Frankie may be working for Briggs, he chooses to work side by side, battling an attraction for Frankie he has never felt for any other woman. Frankie fights Ethan every step of the way, refusing to forgive his deception, even when her heart tells her otherwise. Releasing rats, portraying a hooker, and allowing a grandma to plant a tracking device on Briggs, leads them to realize not everyone is who they seem to be.Content Notes: Sweet, Contemporary, Suspense, Action, Adventure 606 $aRomance fiction$7Generated by AI 606 $aSocial justice in literature$7Generated by AI 615 0$aRomance fiction 615 0$aSocial justice in literature 700 $aGibson$b Edie Jo$01435040 906 $aBOOK 912 $a9910160680103321 996 $aDeception$93592136 997 $aUNINA