Books > Computing & IT > General theory of computing
|
Buy Now
Internet Searches for Vetting, Investigations, and Open-Source Intelligence - Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition (Paperback)
Loot Price: R2,174
Discovery Miles 21 740
|
|
Internet Searches for Vetting, Investigations, and Open-Source Intelligence - Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition (Paperback)
Expected to ship within 12 - 17 working days
|
Donate to Against Period Poverty
Total price: R2,194
Discovery Miles: 21 940
|
In the information age, it is critical that we understand the
implications and exposure of the activities and data documented on
the Internet. Improved efficiencies and the added capabilities of
instant communication, high-speed connectivity to browsers, search
engines, websites, databases, indexing, searching and analytical
applications have made information technology (IT) and the Internet
a vital issued for public and private enterprises. The downside is
that this increased level of complexity and vulnerability presents
a daunting challenge for enterprise and personal security. Internet
Searches for Vetting, Investigations, and Open-Source Intelligence
provides an understanding of the implications of the activities and
data documented by individuals on the Internet. It delineates a
much-needed framework for the responsible collection and use of the
Internet for intelligence, investigation, vetting, and open-source
information. This book makes a compelling case for action as well
as reviews relevant laws, regulations, and rulings as they pertain
to Internet crimes, misbehaviors, and individuals' privacy.
Exploring technologies such as social media and aggregate
information services, the author outlines the techniques and skills
that can be used to leverage the capabilities of networked systems
on the Internet and find critically important data to complete an
up-to-date picture of people, employees, entities, and their
activities. Outlining appropriate adoption of legal, policy, and
procedural principles-and emphasizing the careful and appropriate
use of Internet searching within the law-the book includes coverage
of cases, privacy issues, and solutions for common problems
encountered in Internet searching practice and information usage,
from internal and external threats. The book is a valuable resource
on how to utilize open-source, online sources to gather important
information and screen and vet employees, prospective employees,
corporate partners, and vendors.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|