語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mastering open source threat analysis strategies : = strategic approaches, practical insights, and case studies for effective cyber security /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mastering open source threat analysis strategies :/ Vishal Rai.
其他題名:
strategic approaches, practical insights, and case studies for effective cyber security /
作者:
Rai, Vishal.
面頁冊數:
1 online resource (533 pages)
標題:
COMPUTERS / Internet / Online Safety & Privacy. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000647.html
ISBN:
9789355516398
Mastering open source threat analysis strategies : = strategic approaches, practical insights, and case studies for effective cyber security /
Rai, Vishal.
Mastering open source threat analysis strategies :
strategic approaches, practical insights, and case studies for effective cyber security /Vishal Rai. - 1 online resource (533 pages)
Includes bibliographical references and index.
Mastering open source threat analysis strategies : strategic approaches, practical insights, and case studies for effective cyber security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Setting up OSINT Environment -- Chapter 2: Secure Browsers -- Chapter 3: Exploring OS Security -- Chapter 4: Online Privacy and Security -- Chapter 5: Tail OS in Use -- Chapter 6: Using Tor Browser -- Chapter 7: Advanced Search Tools -- Chapter 8: Sock Puppet Accounts -- Chapter 9: Exploring Footprinting -- Chapter 10: Investigating E-mails -- Chapter 11: Utilizing Social Media -- Chapter 12: Tracking Family and Friends -- Chapter 13: Mobile Identity Search -- Chapter 14: Mining Online Communities -- Chapter 15: Investigating Domain and IP -- Chapter 16: Detection of Data Leaks -- Chapter 17: Understanding Encryption and Digital Certificates -- Chapter 18: Access Fake News -- Chapter 19: Reverse Image Search -- Chapter 20: Geo-location -- Chapter 21: Identify Real Images -- Chapter 22: Use of Aadhaar and Social Security Number -- Chapter 23: Tracking Fraud SMS -- Index.
Access restricted to authorized users and institutions.
OSINT is a powerful technology used to gather and analyze information from publicly available sources. It empowers cybersecurity professionals to proactively detect and mitigate threats. This book serves as a comprehensive guide offering strategic approaches and practical insights into leveraging OSINT for cybersecurity defense. This book is an all-encompassing guide to open-source intelligence (OSINT). It meticulously details tools, techniques, and applications across a multitude of domains. The book explores OSINT’s use in social media, email domains, IP addresses, images, videos, documents, mobile numbers, companies, job postings, and the dark web. It probes OSINT’s application for threat intelligence, data leak detection, understanding encryption, and digital certificates, assessing fake news, reverse image search, geolocation workarounds, real image identification, finding banned organizations, handling sensitive information like Aadhar and Social Security Numbers, while also tracking fraudulent SMS. By the end of this book, readers will emerge as competent cybersecurity professionals equipped with the skills and expertise to navigate the ever-evolving landscape of cyber threats with confidence and proficiency.
Mode of access: World Wide Web.
ISBN: 9789355516398Subjects--Topical Terms:
1483832
COMPUTERS / Internet / Online Safety & Privacy.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.585
Dewey Class. No.: 305.8
Mastering open source threat analysis strategies : = strategic approaches, practical insights, and case studies for effective cyber security /
LDR
:03435nam a2200289 i 4500
001
1157333
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516398
020
$a
9789355518866
035
$a
BPB0000647
041
0
$a
eng
050
0 0
$a
QA76.585
082
0 0
$a
305.8
100
1
$a
Rai, Vishal.
$3
1483941
245
1 0
$a
Mastering open source threat analysis strategies :
$b
strategic approaches, practical insights, and case studies for effective cyber security /
$c
Vishal Rai.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (533 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Mastering open source threat analysis strategies : strategic approaches, practical insights, and case studies for effective cyber security -- Dedication -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Setting up OSINT Environment -- Chapter 2: Secure Browsers -- Chapter 3: Exploring OS Security -- Chapter 4: Online Privacy and Security -- Chapter 5: Tail OS in Use -- Chapter 6: Using Tor Browser -- Chapter 7: Advanced Search Tools -- Chapter 8: Sock Puppet Accounts -- Chapter 9: Exploring Footprinting -- Chapter 10: Investigating E-mails -- Chapter 11: Utilizing Social Media -- Chapter 12: Tracking Family and Friends -- Chapter 13: Mobile Identity Search -- Chapter 14: Mining Online Communities -- Chapter 15: Investigating Domain and IP -- Chapter 16: Detection of Data Leaks -- Chapter 17: Understanding Encryption and Digital Certificates -- Chapter 18: Access Fake News -- Chapter 19: Reverse Image Search -- Chapter 20: Geo-location -- Chapter 21: Identify Real Images -- Chapter 22: Use of Aadhaar and Social Security Number -- Chapter 23: Tracking Fraud SMS -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
OSINT is a powerful technology used to gather and analyze information from publicly available sources. It empowers cybersecurity professionals to proactively detect and mitigate threats. This book serves as a comprehensive guide offering strategic approaches and practical insights into leveraging OSINT for cybersecurity defense. This book is an all-encompassing guide to open-source intelligence (OSINT). It meticulously details tools, techniques, and applications across a multitude of domains. The book explores OSINT’s use in social media, email domains, IP addresses, images, videos, documents, mobile numbers, companies, job postings, and the dark web. It probes OSINT’s application for threat intelligence, data leak detection, understanding encryption, and digital certificates, assessing fake news, reverse image search, geolocation workarounds, real image identification, finding banned organizations, handling sensitive information like Aadhar and Social Security Numbers, while also tracking fraudulent SMS. By the end of this book, readers will emerge as competent cybersecurity professionals equipped with the skills and expertise to navigate the ever-evolving landscape of cyber threats with confidence and proficiency.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Internet / Online Safety & Privacy.
$2
bisacsh
$3
1483832
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000647.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入