|
Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Open Source Intelligence Methods and Tools - A Practical Guide to Online Intelligence (Paperback, 1st ed.)
Loot Price: R1,041
Discovery Miles 10 410
You Save: R197
(16%)
|
|
|
Open Source Intelligence Methods and Tools - A Practical Guide to Online Intelligence (Paperback, 1st ed.)
Expected to ship within 18 - 22 working days
|
Apply Open Source Intelligence (OSINT) techniques, methods, and
tools to acquire information from publicly available online sources
to support your intelligence analysis. Use the harvested data in
different scenarios such as financial, crime, and terrorism
investigations as well as performing business competition analysis
and acquiring intelligence about individuals and other entities.
This book will also improve your skills to acquire information
online from both the regular Internet as well as the hidden web
through its two sub-layers: the deep web and the dark web. The
author includes many OSINT resources that can be used by
intelligence agencies as well as by enterprises to monitor trends
on a global level, identify risks, and gather competitor
intelligence so more effective decisions can be made. You will
discover techniques, methods, and tools that are equally used by
hackers and penetration testers to gather intelligence about a
specific target online. And you will be aware of how OSINT
resources can be used in conducting social engineering attacks.
Open Source Intelligence Methods and Tools takes a practical
approach and lists hundreds of OSINT resources that can be used to
gather intelligence from online public sources. The book also
covers how to anonymize your digital identity online so you can
conduct your searching activities without revealing your identity.
What You'll Learn Identify intelligence needs and leverage a broad
range of tools and sources to improve data collection, analysis,
and decision making in your organization Use OSINT resources to
protect individuals and enterprises by discovering data that is
online, exposed, and sensitive and hide the data before it is
revealed by outside attackers Gather corporate intelligence about
business competitors and predict future market directions Conduct
advanced searches to gather intelligence from social media sites
such as Facebook and Twitter Understand the different layers that
make up the Internet and how to search within the invisible web
which contains both the deep and the dark webs Who This Book Is For
Penetration testers, digital forensics investigators, intelligence
services, military, law enforcement, UN agencies, and
for-profit/non-profit enterprises
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.