top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
Soggetto genere / forma Electronic books.
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910460221703321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910787012103321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (258 p.)
Disciplina 327.12
Soggetto topico Electronic intelligence
Internet in espionage
Cyber intelligence (Computer security)
Internet - Security measures
Computer crimes
ISBN 0-12-801468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods
Protect Yourself!
Record Nr. UNINA-9910829064003321
Shimonski Robert  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013
Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013
Pubbl/distr/stampa Washington : , : U.S. Government Printing Office, , 2013
Descrizione fisica 1 online resource (iii, 45 pages) : illustrations
Soggetto topico Cyberterrorism - China
Cyberterrorism - Russia (Federation)
Cyberterrorism - Iran
Cyberterrorism - United States - Prevention
Cyberspace - Security measures - United States
Cyberinfrastructure - Security measures - United States
Computer networks - Security measures - United States
Internet in espionage
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cyber threats from China, Russia, and Iran
Record Nr. UNINA-9910704999103321
Washington : , : U.S. Government Printing Office, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2015
Descrizione fisica 1 online resource (iii, 95 pages) : illustrations
Collana S. hrg.
Soggetto topico Cyberterrorism - United States - Prevention
Cyberinfrastructure - Security measures - United States
Computer networks - Security measures - United States
Computer security - United States
Internet in espionage
Cyber intelligence (Computer security) - United States
National security - United States
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Cybersecurity, terrorism, and beyond
Record Nr. UNINA-9910698619103321
Washington : , : U.S. Government Publishing Office, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Grizzly steppe : Russian malicious cyber activity
Grizzly steppe : Russian malicious cyber activity
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016
Descrizione fisica 1 online resource (13 pages) : color illustrations
Soggetto topico Espionage, Russian - United States
Internet in espionage
Computer security - United States
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
Cyberterrorism - Russia (Federation)
Hacking - Prevention
Computer crimes - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Grizzly steppe
Record Nr. UNINA-9910707821303321
[Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inquiry into cyber intrusions affecting U.S. Transportation Command contractors : report of the Committee on Armed Services, United States Senate
Inquiry into cyber intrusions affecting U.S. Transportation Command contractors : report of the Committee on Armed Services, United States Senate
Pubbl/distr/stampa Washington : , : U.S. Government Printing Office, , 2014
Descrizione fisica 1 online resource (x, 34 pages) : illustrations
Collana Report / 113th Congress, 2d session, Senate
Soggetto topico Government contractors - United States
Cyber intelligence (Computer security) - United States
Defense contracts - Data processing - Security measures - United States
Computer networks - Security measures - United States
Cyberterrorism - United States
Internet in espionage
Soggetto genere / forma Legislative materials.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Inquiry into cyber intrusions affecting U.S. Transportation Command contractors
Record Nr. UNINA-9910702651403321
Washington : , : U.S. Government Printing Office, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / / Bryan Krekel, Patton Adams, George Bakos
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / / Bryan Krekel, Patton Adams, George Bakos
Autore Krekel Bryan A.
Pubbl/distr/stampa [Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012
Descrizione fisica 1 online resource (136 pages)
Soggetto topico Cyberspace - Government policy - China
Computer crimes - China
Cyberterrorism - China
Information warfare - China
Internet in espionage - China
Telecommunication - Research - China
Computer crimes
Cyberspace - Government policy
Cyberterrorism
Information technology
Information warfare
Internet in espionage
Telecommunication - Research
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Occupying the information high ground
Record Nr. UNINA-9910716668903321
Krekel Bryan A.  
[Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Task force on cyber deterrence / / Department of Defense Science Board
Task force on cyber deterrence / / Department of Defense Science Board
Pubbl/distr/stampa Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2017
Descrizione fisica 1 online resource (i, 36 pages)
Soggetto topico Cyberspace - Security measures - United States
Information warfare
Internet in espionage
National security - United States
Cyberterrorism - United States - Prevention
Computer networks - Security measures - United States
Military planning - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Final Report of the Defense Science Board (DSB) Task Force on cyber deterrence
Record Nr. UNINA-9910708089503321
Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Task force report : resilient military systems and the advanced cyber threat / / Department of Defense Science Board
Task force report : resilient military systems and the advanced cyber threat / / Department of Defense Science Board
Pubbl/distr/stampa Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2013
Descrizione fisica 1 online resource (vi, 138 pages) : color illustrations
Soggetto topico Cyberspace - Security measures - United States
Information warfare
Internet in espionage
National security - United States
Cyberterrorism - United States - Prevention
Computer networks - Security measures - United States
Military planning - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Task force report
Record Nr. UNINA-9910702417603321
Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui