Cyber Reconnaissance, Surveillance and Defense - 1st Edition - ISBN: 9780128013083, 9780128014684

Cyber Reconnaissance, Surveillance and Defense

1st Edition

Authors: Robert Shimonski
eBook ISBN: 9780128014684
Paperback ISBN: 9780128013083
Imprint: Syngress
Published Date: 16th October 2014
Page Count: 258
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
45.95
32.16
32.16
32.16
32.16
32.16
36.76
36.76
36.99
25.89
25.89
25.89
25.89
25.89
29.59
29.59
59.95
41.97
41.97
41.97
41.97
41.97
47.96
47.96
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.

Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.

Key Features

  • Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
  • Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
  • Learn how to thwart monitoring and surveillance threats with practical tools and techniques
  • Real-world examples teach using key concepts from cases in the news around the world

Readership

information security practitioners, analysts, and engineers; forensic specialists; hackers; network administrators; computer system administrators; information security consultants; security researchers; penetration testers

Table of Contents

  • Dedication
  • About the Authors
  • Acknowledgments
  • Introduction
  • Chapter 1: Digital Reconnaissance and Surveillance
    • Abstract
    • Digital reconnaissance and surveillance
    • Threat of digital reconnaissance and surveillance
    • Why spy?
    • Who spies?
    • Legal and ethical principles
    • Summary
  • Chapter 2: Information Gathering
    • Abstract
    • Information gathering
    • Online reconnaissance
    • Physical reconnaissance
    • Summary
  • Chapter 3: Social Engineering
    • Abstract
    • Social engineering
    • Mitigation of social engineering
    • Legal and ethical concerns
    • Summary
  • Chapter 4: Mobile Phone Tracking
    • Abstract
    • Phone tracking
    • Malicious tracking
    • Legal and ethical concerns
    • Summary
  • Chapter 5: Physical Device Tracking
    • Abstract
    • Physical tracking
    • Legal and ethical concerns
    • Summary
  • Chapter 6: Web Camera and Video Tracking
    • Abstract
    • Camera tracking
    • Legal and ethical concerns
    • Summary
  • Chapter 7: Data Capture and Exploitation
    • Abstract
    • Data threat
    • Legal and ethical concerns
    • Summary
  • Chapter 8: Protection Methods
    • Abstract
    • Protect yourself!
    • Summary
  • Index

Details

No. of pages:
258
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780128014684
Paperback ISBN:
9780128013083

About the Author

Robert Shimonski

Robert Shimonski

Rob Shimonski (www.shimonski.com) is an experienced entrepreneur and an active participant in the business community. Rob is a best-selling author and editor with over 15 years experience developing, producing and distributing print media in the form of books, magazines and periodicals. To date, Rob has successfully created over 100 books that are currently in circulation. Rob has worked for countless companies to include CompTIA, Entrepreneur Magazine, Microsoft, McGraw Hill Education, Cisco, the National Security Agency and Digidesign. Rob has an extremely diverse background in the print media industry filling roles such as author, co-author, technical editor, copy editor and developmental editor. Since print media shifted to the digital domain, Rob has focused the past decade on developing all of the needed skills to produce professional audio and video media. An expert in Digital Audio Workstation (DAW) design and video production, Rob has created over 500 different media packages to include commercials for TV, online advertising clips, audio podcasts and much more. Rob started to train others while in the US Marine Corps. Since, Rob has held a NY State teaching certificate as well as multiple trainer roles in colleges and trade schools across the world.

Affiliations and Expertise

is a networking and security veteran with over 20 years' experience in military, corporate and educational environments.

Reviews

"...an easy-to-read and informative book that can help the general public improve their awareness of cyberthreats and risk-mitigation approaches." --Computing Reviews