Syndetics cover image
Image from Syndetics

Cyber reconnaissance, surveillance, and defense / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor.

By: Contributor(s): Material type: TextTextPublisher: Waltham, Massachusetts : Syngress, 2015Copyright date: ©2015Description: 1 online resource (258 pages) : color illustrations, photographsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128014684 (e-book)
Subject(s): Genre/Form: Additional physical formats: Print version:: Cyber reconnaissance, surveillance, and defense.DDC classification:
  • 327.12 23
LOC classification:
  • TK7882.E2 .S56 2015
Online resources:
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Online Books Ebrary Online Books Colombo Available CBERA1000478
Ebrary Online Books Ebrary Online Books Jaffna Available JFEBRA1000478
Ebrary Online Books Ebrary Online Books Kandy Available KDEBRA1000478
Total holds: 0

Enhanced descriptions from Syndetics:

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.- Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations- Find out about the legal basis of these attacks and threats -- what is legal and what is not -- and how to defend against any type of surveillance- Learn how to thwart monitoring and surveillance threats with practical tools and techniques- Real-world examples teach using key concepts from cases in the news around the world

Includes index.

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

There are no comments on this title.

to post a comment.