The OSINT Handbook: A Practical Guide to Gathering and Analyzing Online Information
Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threats Key Features Explore some of the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng Develop an OSINT-driven threat intelligenc...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2024
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781837638277/?ar |
Zusammenfassung: | Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threats Key Features Explore some of the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng Develop an OSINT-driven threat intelligence program to mitigate cyber risks Leverage the power of information through OSINT with real-world case studies Purchase of the print or Kindle book includes a free PDF eBook Book Description The rapid expansion of IT and digital businesses has brought along a surge in online threats, amplifying cybersecurity risks and the need for effective solutions. Enter the OSINT framework, a pivotal ally, enabling organizations with a powerful toolset to proactively fortify security measures. The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities. Starting with an introduction to the concept of OSINT, this book explores its applications and the legal and ethical considerations associated with OSINT research. You'll find essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, this book emphasizes anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. What you will learn Work with real-life examples of OSINT in action and discover best practices Automate OSINT collection and analysis Harness social media data for OSINT purposes Manage your digital footprint to reduce risk and maintain privacy Uncover and analyze hidden information within documents Implement an effective OSINT-driven threat intelligence program Leverage OSINT techniques to enhance organizational security Who this book is for This book is for ethical hackers and security professionals who want to expand their cybersecurity knowledge and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required. |
Beschreibung: | Description based upon print version of record. - Tools and techniques for visualizing OSINT data |
Umfang: | 1 Online-Ressource (198 Seiten) |
ISBN: | 9781837635283 1837635285 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102562725 | ||
003 | DE-627-1 | ||
005 | 20240429114544.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781837635283 |9 978-1-83763-528-3 | ||
020 | |a 1837635285 |9 1-83763-528-5 | ||
035 | |a (DE-627-1)102562725 | ||
035 | |a (DE-599)KEP102562725 | ||
035 | |a (ORHE)9781837638277 | ||
035 | |a (DE-627-1)102562725 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240409 | |
100 | 1 | |a Meredith, Dale |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The OSINT Handbook |b A Practical Guide to Gathering and Analyzing Online Information |c Dale Meredith ; foreword by Greg Shields |
250 | |a 1st edition. | ||
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2024 | |
300 | |a 1 Online-Ressource (198 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. - Tools and techniques for visualizing OSINT data | ||
520 | |a Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threats Key Features Explore some of the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng Develop an OSINT-driven threat intelligence program to mitigate cyber risks Leverage the power of information through OSINT with real-world case studies Purchase of the print or Kindle book includes a free PDF eBook Book Description The rapid expansion of IT and digital businesses has brought along a surge in online threats, amplifying cybersecurity risks and the need for effective solutions. Enter the OSINT framework, a pivotal ally, enabling organizations with a powerful toolset to proactively fortify security measures. The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities. Starting with an introduction to the concept of OSINT, this book explores its applications and the legal and ethical considerations associated with OSINT research. You'll find essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, this book emphasizes anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. What you will learn Work with real-life examples of OSINT in action and discover best practices Automate OSINT collection and analysis Harness social media data for OSINT purposes Manage your digital footprint to reduce risk and maintain privacy Uncover and analyze hidden information within documents Implement an effective OSINT-driven threat intelligence program Leverage OSINT techniques to enhance organizational security Who this book is for This book is for ethical hackers and security professionals who want to expand their cybersecurity knowledge and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required. | ||
650 | 0 | |a Open source intelligence | |
650 | 0 | |a Computer security | |
650 | 4 | |a Renseignements de sources ouvertes | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Shields, Greg |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781837638277/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102562725 |
---|---|
_version_ | 1821494932977745920 |
adam_text | |
any_adam_object | |
author | Meredith, Dale |
author2 | Shields, Greg |
author2_role | ctb |
author2_variant | g s gs |
author_facet | Meredith, Dale Shields, Greg |
author_role | aut |
author_sort | Meredith, Dale |
author_variant | d m dm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102562725 (DE-599)KEP102562725 (ORHE)9781837638277 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04048nam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-102562725</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114544.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837635283</subfield><subfield code="9">978-1-83763-528-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837635285</subfield><subfield code="9">1-83763-528-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562725</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102562725</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837638277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562725</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240409</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Meredith, Dale</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The OSINT Handbook</subfield><subfield code="b">A Practical Guide to Gathering and Analyzing Online Information</subfield><subfield code="c">Dale Meredith ; foreword by Greg Shields</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (198 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - Tools and techniques for visualizing OSINT data</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threats Key Features Explore some of the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng Develop an OSINT-driven threat intelligence program to mitigate cyber risks Leverage the power of information through OSINT with real-world case studies Purchase of the print or Kindle book includes a free PDF eBook Book Description The rapid expansion of IT and digital businesses has brought along a surge in online threats, amplifying cybersecurity risks and the need for effective solutions. Enter the OSINT framework, a pivotal ally, enabling organizations with a powerful toolset to proactively fortify security measures. The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities. Starting with an introduction to the concept of OSINT, this book explores its applications and the legal and ethical considerations associated with OSINT research. You'll find essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, this book emphasizes anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. What you will learn Work with real-life examples of OSINT in action and discover best practices Automate OSINT collection and analysis Harness social media data for OSINT purposes Manage your digital footprint to reduce risk and maintain privacy Uncover and analyze hidden information within documents Implement an effective OSINT-driven threat intelligence program Leverage OSINT techniques to enhance organizational security Who this book is for This book is for ethical hackers and security professionals who want to expand their cybersecurity knowledge and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Renseignements de sources ouvertes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shields, Greg</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837638277/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102562725 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:14Z |
institution | BVB |
isbn | 9781837635283 1837635285 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (198 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Meredith, Dale VerfasserIn aut The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information Dale Meredith ; foreword by Greg Shields 1st edition. Birmingham Packt Publishing, Limited 2024 1 Online-Ressource (198 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based upon print version of record. - Tools and techniques for visualizing OSINT data Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threats Key Features Explore some of the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng Develop an OSINT-driven threat intelligence program to mitigate cyber risks Leverage the power of information through OSINT with real-world case studies Purchase of the print or Kindle book includes a free PDF eBook Book Description The rapid expansion of IT and digital businesses has brought along a surge in online threats, amplifying cybersecurity risks and the need for effective solutions. Enter the OSINT framework, a pivotal ally, enabling organizations with a powerful toolset to proactively fortify security measures. The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities. Starting with an introduction to the concept of OSINT, this book explores its applications and the legal and ethical considerations associated with OSINT research. You'll find essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, this book emphasizes anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT. What you will learn Work with real-life examples of OSINT in action and discover best practices Automate OSINT collection and analysis Harness social media data for OSINT purposes Manage your digital footprint to reduce risk and maintain privacy Uncover and analyze hidden information within documents Implement an effective OSINT-driven threat intelligence program Leverage OSINT techniques to enhance organizational security Who this book is for This book is for ethical hackers and security professionals who want to expand their cybersecurity knowledge and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required. Open source intelligence Computer security Renseignements de sources ouvertes Sécurité informatique Shields, Greg MitwirkendeR ctb |
spellingShingle | Meredith, Dale The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information Open source intelligence Computer security Renseignements de sources ouvertes Sécurité informatique |
title | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information |
title_auth | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information |
title_exact_search | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information |
title_full | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information Dale Meredith ; foreword by Greg Shields |
title_fullStr | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information Dale Meredith ; foreword by Greg Shields |
title_full_unstemmed | The OSINT Handbook A Practical Guide to Gathering and Analyzing Online Information Dale Meredith ; foreword by Greg Shields |
title_short | The OSINT Handbook |
title_sort | osint handbook a practical guide to gathering and analyzing online information |
title_sub | A Practical Guide to Gathering and Analyzing Online Information |
topic | Open source intelligence Computer security Renseignements de sources ouvertes Sécurité informatique |
topic_facet | Open source intelligence Computer security Renseignements de sources ouvertes Sécurité informatique |
work_keys_str_mv | AT meredithdale theosinthandbookapracticalguidetogatheringandanalyzingonlineinformation AT shieldsgreg theosinthandbookapracticalguidetogatheringandanalyzingonlineinformation AT meredithdale osinthandbookapracticalguidetogatheringandanalyzingonlineinformation AT shieldsgreg osinthandbookapracticalguidetogatheringandanalyzingonlineinformation |