Cyber reconnaissance surveillance and defense:
Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threa...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2015
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128013083/?ar |
Zusammenfassung: | Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- |
Beschreibung: | Includes index. - Online resource; title from title page (Safari, viewed November 7, 2014) |
Umfang: | 1 online resource (xiv, 240 pages) illustrations |
ISBN: | 9780128014684 0128014687 0128013087 9780128013083 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047406437 | ||
003 | DE-627-1 | ||
005 | 20240228115707.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9780128014684 |9 978-0-12-801468-4 | ||
020 | |a 0128014687 |9 0-12-801468-7 | ||
020 | |a 0128013087 |9 0-12-801308-7 | ||
020 | |a 9780128013083 |9 978-0-12-801308-3 | ||
020 | |a 9780128013083 |9 978-0-12-801308-3 | ||
035 | |a (DE-627-1)047406437 | ||
035 | |a (DE-599)KEP047406437 | ||
035 | |a (ORHE)9780128013083 | ||
035 | |a (DE-627-1)047406437 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a POL |2 bisacsh | |
072 | 7 | |a POL |2 bisacsh | |
082 | 0 | |a 327.12 |2 23 | |
100 | 1 | |a Shimonski, Robert |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber reconnaissance surveillance and defense |c Robert Shimonski |
264 | 1 | |a Waltham, MA |b Syngress |c 2015 | |
300 | |a 1 online resource (xiv, 240 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from title page (Safari, viewed November 7, 2014) | ||
520 | |a Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- | ||
546 | |a English. | ||
650 | 0 | |a Electronic intelligence | |
650 | 0 | |a Internet in espionage | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Computer crimes | |
650 | 4 | |a Renseignement électronique | |
650 | 4 | |a Internet dans l'espionnage | |
650 | 4 | |a Surveillance des menaces informatiques | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a POLITICAL SCIENCE ; Government ; International | |
650 | 4 | |a POLITICAL SCIENCE ; International Relations ; General | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Electronic intelligence | |
650 | 4 | |a Internet in espionage | |
650 | 4 | |a Internet ; Security measures | |
776 | 1 | |z 9780128013083 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128013083 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128013083/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047406437 |
---|---|
_version_ | 1833357113597886465 |
adam_text | |
any_adam_object | |
author | Shimonski, Robert |
author_facet | Shimonski, Robert |
author_role | aut |
author_sort | Shimonski, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047406437 (DE-599)KEP047406437 (ORHE)9780128013083 |
dewey-full | 327.12 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.12 |
dewey-search | 327.12 |
dewey-sort | 3327.12 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02948cam a22006492c 4500</leader><controlfield tag="001">ZDB-30-ORH-047406437</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115707.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128014684</subfield><subfield code="9">978-0-12-801468-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128014687</subfield><subfield code="9">0-12-801468-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128013087</subfield><subfield code="9">0-12-801308-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128013083</subfield><subfield code="9">978-0-12-801308-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128013083</subfield><subfield code="9">978-0-12-801308-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047406437</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047406437</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128013083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047406437</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.12</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shimonski, Robert</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber reconnaissance surveillance and defense</subfield><subfield code="c">Robert Shimonski</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 240 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from title page (Safari, viewed November 7, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. --</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet in espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Renseignement électronique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet dans l'espionnage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE ; Government ; International</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE ; International Relations ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet in espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128013083</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128013083</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128013083/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047406437 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:32Z |
institution | BVB |
isbn | 9780128014684 0128014687 0128013087 9780128013083 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xiv, 240 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Shimonski, Robert VerfasserIn aut Cyber reconnaissance surveillance and defense Robert Shimonski Waltham, MA Syngress 2015 1 online resource (xiv, 240 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from title page (Safari, viewed November 7, 2014) Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts from cases in the news around the world. -- English. Electronic intelligence Internet in espionage Cyber intelligence (Computer security) Internet Security measures Computer crimes Renseignement électronique Internet dans l'espionnage Surveillance des menaces informatiques Internet ; Sécurité ; Mesures Criminalité informatique POLITICAL SCIENCE ; Government ; International POLITICAL SCIENCE ; International Relations ; General Internet ; Security measures 9780128013083 Erscheint auch als Druck-Ausgabe 9780128013083 |
spellingShingle | Shimonski, Robert Cyber reconnaissance surveillance and defense Electronic intelligence Internet in espionage Cyber intelligence (Computer security) Internet Security measures Computer crimes Renseignement électronique Internet dans l'espionnage Surveillance des menaces informatiques Internet ; Sécurité ; Mesures Criminalité informatique POLITICAL SCIENCE ; Government ; International POLITICAL SCIENCE ; International Relations ; General Internet ; Security measures |
title | Cyber reconnaissance surveillance and defense |
title_auth | Cyber reconnaissance surveillance and defense |
title_exact_search | Cyber reconnaissance surveillance and defense |
title_full | Cyber reconnaissance surveillance and defense Robert Shimonski |
title_fullStr | Cyber reconnaissance surveillance and defense Robert Shimonski |
title_full_unstemmed | Cyber reconnaissance surveillance and defense Robert Shimonski |
title_short | Cyber reconnaissance surveillance and defense |
title_sort | cyber reconnaissance surveillance and defense |
topic | Electronic intelligence Internet in espionage Cyber intelligence (Computer security) Internet Security measures Computer crimes Renseignement électronique Internet dans l'espionnage Surveillance des menaces informatiques Internet ; Sécurité ; Mesures Criminalité informatique POLITICAL SCIENCE ; Government ; International POLITICAL SCIENCE ; International Relations ; General Internet ; Security measures |
topic_facet | Electronic intelligence Internet in espionage Cyber intelligence (Computer security) Internet Security measures Computer crimes Renseignement électronique Internet dans l'espionnage Surveillance des menaces informatiques Internet ; Sécurité ; Mesures Criminalité informatique POLITICAL SCIENCE ; Government ; International POLITICAL SCIENCE ; International Relations ; General Internet ; Security measures |
work_keys_str_mv | AT shimonskirobert cyberreconnaissancesurveillanceanddefense |