本站提供 8500 多本免费的 IT 技术电子书在线下载。
  1. 文章总数:8391
  2. 浏览总数:249,264
  3. 评论:0
  4. 分类目录:125 个
  5. 注册用户数:29
  6. 最后更新:2019年11月22日
过往记忆博客公共帐号iteblog_hadoop
欢迎关注微信公共帐号:
iteblog_hadoop

Open Source Intelligence Methods and Tools

安全 iteblog 26℃ 0评论

关注 过往记忆大数据 微信公众号,回复 7674 获取本书下载地址。

子标题:A Practical Guide to Online Intelligence

Open Source Intelligence Methods and Tools
作者:
Nihad A. Hassan, Rami Hijazi
ISBN-10:
1484232127
出版年份:
2018
页数:
354
语言:
English
文件大小:
10.8 MB
文件格式:
PDF

图书描述

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.

The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks.

Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity.

What You’ll Learn

  • Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
  • Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers
  • Gather corporate intelligence about business competitors and predict future market directions
  • Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter
  • Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs

Who This Book Is For

Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

下载地址

关注 过往记忆大数据 微信公众号,回复 7674 获取本书下载地址。

如图书无法下载,请加微信 fangzhen0219 反馈。
喜欢 (1)or分享 (0)
发表我的评论
取消评论

表情
本博客评论系统带有自动识别垃圾评论功能,请写一些有意义的评论,谢谢!