Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques

4.8

بر اساس نظر کاربران

شما میتونید سوالاتتون در باره کتاب رو از هوش مصنوعیش بعد از ورود بپرسید
هر دانلود یا پرسش از هوش مصنوعی 2 امتیاز لازم دارد، برای بدست آوردن امتیاز رایگان، به صفحه ی راهنمای امتیازات سر بزنید و یک سری کار ارزشمند انجام بدین

کتاب های مرتبط:

THE ART AND SCIENCE OF TRACKING CYBERCRIME TO ITS SOURCE When your organization falls victim to cybercrime, you need to be ready to fight back. The burden of investigating digital security breaches often falls to organizations themselves, so developing a robust toolkit that enables you to track down criminals is essential. Hunting Cyber Criminals is filled with proven techniques to research the source of illicit network traffic, extract intelligence from publicly available web sources, and hunt the individuals who would do harm to your organization. With easy-to-follow examples Hunting Cyber Criminals provides vital guidance on investigating cybersecurity incidents. It shows how, even starting from just a single IP address, you can embark on an investigative journey to uncover the information you need to shore up your defenses, involve law enforcement, and shut down hackers for good. Learn from Vinny Troia's unique methodology and the practical techniques used to investigate and identify members of the cyber terrorist group known as The Dark Overlord. Beyond the author's own expertise, you'll benefit from guest comments by fellow industry experts: Alex Heid, Bob Diachenko, Cat Murdoch, Chris Hadnagy, Chris Roberts, John Strand, Jonathan Cran, Leslie Carhart, Nick Furneux, Rob Fuller, Troy Hunt, and William Martin. For cybersecurity and business professionals involved in developing cyber incident response strategies, this compendium of the latest tools, techniques, and resources will prove indispensable. Cybercrime is a reality, not just a possibility, in today's business environments. Readiness to respond starts here. Learn about the latest cybercrime investigation tools Uncover clues to identify and track hackers anywhere Use network discovery to follow unwanted network traffic Search web databases to gather intelligence and leads Use social media to identify probable perpetrators Master complex web scenarios and advanced search techniques Employ expert tips and tricks in your own investigations ABOUT NIGHT LION SECURITY Night Lion Security provides network, website, and IT security consulting, services. The company specializes in advanced penetration testing and IT risk management.

دانلود رایگان مستقیم

برای دانلود رایگان این کتاب و هزاران کتاب دیگه همین حالا عضو بشین

نویسندگان:


نظرات:


4.8

بر اساس 0 نظر کاربران