Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

1st Edition - March 15, 2005

Write a review

  • Authors: Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
  • eBook ISBN: 9780080488653

Purchase options

Purchase options
DRM-free (EPub, PDF, Mobi)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Key Features

  • Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services
  • Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level
  • Targets a wide audience: personal computer users, specifically those interested in the online activities of their families

Readership

Everyday Computer Users

Table of Contents

  • Acknowledgments

    Authors

    Technical Editor

    Foreword

    Chapter 1: Why Spy?

    Introduction to Spying

    Pray for Peace, Prepare for War

    Ethics of Spying

    Spying on Spouses

    Spying on Your Children

    When You Should Not Spy

    Real-World Case Study

    Summary

    Chapter 2: Spying Basics

    Introduction

    Goals of Spying

    Psychology of Spying

    Spying Methodology

    Using Overt Monitoring as a Deterrent

    Using Covert Spying to Observe Behavior

    Demonstration

    Case Study: Dangers of Misinterpretation and Distrust

    Summary

    Chapter 3: Technology Overview: Computer Basics

    Introduction

    Hardware

    Software

    Summary

    Chapter 4: Network Basics

    Introduction

    Network Basics

    IP Address

    Network Traffic

    Summary

    Chapter 5: Taking Control

    Introduction

    Cover Your Tracks

    Basic Skills

    Software You Will Use

    Mastering Your Domain

    Summary

    Chapter 6: Spying on the PC

    Introduction

    Mission 1: Collect the Basics

    Mission 2: Examining the Past

    Mission 3: Live for the Present

    Mission 4: Prepare for the Future

    Mission 5: Look for Hidden Information

    Case Study: Expand Your Investigation Beyond the Local Computer

    Summary

    Chapter 7: Spying on Web Browsing

    Introduction

    What Is Web Browsing?

    What Can You Get from Web Browsing?

    Typical Web Browsers

    Basic Skills

    Collecting Information from Your Target’s Computer

    Collecting Information about Your Target from the Network

    Summary

    Chapter 8: Spying on E-mail

    Introduction

    Overview of E-mail

    Popular E-mail Clients

    Web Mail

    Collecting E-mail

    Case Study: Return to Sender

    Summary

    Chapter 9: Spying on Chat and Instant Messages

    Introduction

    What Is Instant Messaging?

    Types of Chat and Instant Messaging

    Collecting Passwords and Buddy Lists

    Collecting Chat and Instant Messages

    Impersonation

    Summary

    Chapter 10: Advanced Techniques

    Introduction

    Improving Your Skills

    Expanding Your Horizons

    Summary

    Chapter 11: Counterspy: Are You Being Watched?

    Introduction

    How to Be Sneaky

    How to Tell If You Are Being Watched

    How to React If You Are a Target

    Identifying Who is Spying on You

    A Note about Spyware

    Case Study: Guilt is for Suckers, Not Spies

    Summary

    Index

Product details

  • No. of pages: 400
  • Language: English
  • Copyright: © Syngress 2005
  • Published: March 15, 2005
  • Imprint: Syngress
  • eBook ISBN: 9780080488653

About the Authors

Eric Cole

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.

Affiliations and Expertise

Independant network security consultant and speaker, USA

Michael Nordfelt

Sandra Ring

Affiliations and Expertise

Deputy Directory for Research at the TSGI Advanced Technology Research Center, USA

Ted Fair

Ratings and Reviews

Write a review

There are currently no reviews for "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives"