Book description
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.
Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
- Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
- Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
- Learn how to thwart monitoring and surveillance threats with practical tools and techniques
- Real-world examples teach using key concepts from cases in the news around the world
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Authors
- Acknowledgments
- Introduction
- Chapter 1: Digital Reconnaissance and Surveillance
- Chapter 2: Information Gathering
- Chapter 3: Social Engineering
- Chapter 4: Mobile Phone Tracking
- Chapter 5: Physical Device Tracking
- Chapter 6: Web Camera and Video Tracking
- Chapter 7: Data Capture and Exploitation
- Chapter 8: Protection Methods
- Index
Product information
- Title: Cyber Reconnaissance, Surveillance and Defense
- Author(s):
- Release date: October 2014
- Publisher(s): Syngress
- ISBN: 9780128014684
You might also like
book
Reverse Deception: Organized Cyber Threat Counter-Exploitation
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts …
book
No Tech Hacking
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in …
book
A Leader's Guide to Cybersecurity
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep …
book
Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s …