Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1380
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:19Z-
dc.date.available2020-05-17T08:28:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9781484232132 ;en_US
dc.identifier.isbn9781484232125 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1380-
dc.descriptionPrinted edition: ; 9781484232125. ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractApply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What Youeell Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Nexte.-. ;en_US
dc.format.extentXXIII, 354 p. 146 illus. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484232125.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleOpen Source Intelligence Methods and Toolsen_US
dc.title.alternativeA Practical Guide to Online Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484232125.pdf11.06 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:19Z-
dc.date.available2020-05-17T08:28:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9781484232132 ;en_US
dc.identifier.isbn9781484232125 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1380-
dc.descriptionPrinted edition: ; 9781484232125. ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractApply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What Youeell Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Nexte.-. ;en_US
dc.format.extentXXIII, 354 p. 146 illus. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484232125.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleOpen Source Intelligence Methods and Toolsen_US
dc.title.alternativeA Practical Guide to Online Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484232125.pdf11.06 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:19Z-
dc.date.available2020-05-17T08:28:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9781484232132 ;en_US
dc.identifier.isbn9781484232125 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1380-
dc.descriptionPrinted edition: ; 9781484232125. ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractApply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What Youeell Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Nexte.-. ;en_US
dc.format.extentXXIII, 354 p. 146 illus. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484232125.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleOpen Source Intelligence Methods and Toolsen_US
dc.title.alternativeA Practical Guide to Online Intelligence /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484232125.pdf11.06 MBAdobe PDFThumbnail
Preview File