• - Alle Rubriken -
  • Bücher
  • Lernen / Pädagogik
  • Hörbücher
  • Software / Games / Hardware
  • Musik / Filme
  • Spiele
  • Kalender
  • Geschenke / Papeterie
  • Karten / Globen
  • Schweiz
  • Englisch und andere Fremdsprachen
  • Lieferbar
  • Neuheit
  • Archiv
  • - Alle Rubriken -
  • Bücher
  • Lernen / Pädagogik
  • Hörbücher
  • Software / Games / Hardware
  • Musik / Filme
  • Spiele
  • Kalender
  • Geschenke / Papeterie
  • Karten / Globen
  • Schweiz
  • Englisch und andere Fremdsprachen
  • - Alle -
  • Audio CD
  • Audio MP3
  • Blu-ray
  • CD ROM, DVD-ROM
  • DVD-Video
  • E-Book EPUB
  • E-Book PDF
  • Hardcover, gebunden
  • Taschenbuch, kartoniert
  • - Alle -
  • Aargauer Mundart
  • Abchasisch (apsua)
  • Aceh-sprache (atje-sprache)
  • Acholi-sprache
  • Adangme-sprache
  • Adygei-sprache
  • Aegyptisch
  • Afrihili
  • Afrikaans
  • Ainu
  • Akan-sprache
  • Akkadisch (assyrisch-babylonisch)
  • Albanisch
  • Alemannisch
  • Algonkin-sprachen
  • Altaethiopisch
  • Altaische Sprachen (andere)
  • Altenglisch (ca. 450-1100)
  • Altfranzoesisch (842-ca. 1400)
  • Althochdeutsch (ca. 750-1050)
  • Altirisch (bis 900)
  • Altnorwegisch
  • Altprovenzalisch (bis 1500)
  • Amharisch
  • Apachen-sprache
  • Appenzellerdeutsch
  • Arabisch
  • Aragonisches Spanisch
  • Aramaeisch
  • Arapaho-sprache
  • Arawak-sprachen
  • Armenisch
  • Aserbaidschanisch (azerbajdzanisch)
  • Assamesisch (asamiya)
  • Asturisch
  • Athapaskische Sprachen
  • Australische Sprachen
  • Austronesische Sprachen
  • Aymara-sprache
  • Bahasa Indonesia
  • Baltische Sprachen
  • Bambara-sprache
  • Bantusprachen
  • Basaa-sprache
  • Baschkirisch
  • Baseldeutsch
  • Baskisch
  • Bayrisch
  • Beach-la-mar
  • Bedauye
  • Bemba-sprache
  • Bengali
  • Berbersprachen
  • Berlinerisch
  • Berndeutsch
  • Bhojpuri (bajpuri)
  • Birmanisch
  • Bokmal
  • Bosnisch
  • Braj-bhakha
  • Brandenburger Mundart
  • Bretonisch
  • Bugi-sprache
  • Bulgarisch
  • Caddo-sprachen
  • Cebuano
  • Chamorro-sprache
  • Cherokee-sprache
  • Chinesisch
  • Chinook-jargon
  • Chipewyan
  • Choctaw-sprache
  • Cree-sprache
  • Daenisch
  • Dakota-sprache
  • Danakil-sprache
  • Delaware-sprache
  • Deutsch
  • Dinka-sprache
  • Dogrib-sprache
  • Drawidische Sprachen
  • Dzongkha
  • Efik
  • Elamisch
  • Elsaessisch
  • Englisch
  • Ersjanisch
  • Esperanto
  • Estnisch
  • Ewe-sprache
  • Faeroeisch
  • Fanti-sprache
  • Farsi
  • Fidschi-sprache
  • Filipino
  • Finnisch
  • Finnougrische Sprachen
  • Fon-sprache
  • Fraenkisch
  • Franzoesisch
  • Friulisch
  • Ful
  • Ga
  • Gaelisch-schottisch
  • Galicisch
  • Galla-sprache
  • Ganda-sprache
  • Georgisch
  • Germanische Sprachen
  • Gilbertesisch
  • Glarner Mundart
  • Gotisch
  • Griechisch (bis 1453)
  • Groenlaendisch
  • Guarani-sprache
  • Gujarati-sprache
  • Haida-sprache
  • Haitisches Creolisch
  • Hamitosemitische Sprachen
  • Haussa-sprache
  • Hawaiisch
  • Hebraeisch
  • Herero-sprache
  • Hessisch
  • Hiligaynon-sprache
  • Himachali
  • Hindi
  • Iban
  • Ibo-sprache
  • Ido
  • Ilokano-sprache
  • Indianersprachen (nordamerik.)
  • Indianersprachen (suedamerik.)
  • Indianersprachen / Zentralamerika
  • Indoarische Sprachen
  • Indogermanische Sprachen
  • Ingush-sprache
  • Interlingua (iala)
  • Interlingue
  • Inuktitut
  • Iranische Sprachen
  • Irisch
  • Irokesische Sprachen
  • Islaendisch
  • Italienisch
  • Japanisch
  • Javanisch
  • Jiddisch
  • Judenspanisch
  • Juedisch-arabisch
  • Kabardinisch
  • Kabylisch
  • Kambodschanisch
  • Kannada
  • Karenisch
  • Karibische Sprachen
  • Kasachisch
  • Kaschmiri
  • Katalanisch
  • Kaukasische Sprachen
  • Kein Sprachlicher Inhalt
  • Keltische Sprachen
  • Khasi-sprache
  • Khoisan-sprachen
  • Kikuyu-sprache
  • Kirchenslawisch
  • Kirgisisch
  • Klassisches Syrisch
  • Koelsch
  • Komi-sprachen
  • Kongo
  • Konkani
  • Koptisch
  • Koreanisch
  • Kornisch
  • Korsisch
  • Kpelle-sprache
  • Kreolisch-englisch
  • Kreolisch-franzoesisch
  • Kreolisch-portugiesisch
  • Kreolische Sprachen
  • Kroatisch
  • Kru-sprachen
  • Kurdisch
  • Kurdisch (sorani)
  • Kutchin
  • Laotisch
  • Latein
  • Lesgisch
  • Lettisch
  • Lingala
  • Litauisch
  • Luba-sprache
  • Luiseno-sprache
  • Lulua-sprache
  • Luo-sprache
  • Luxemburgisch
  • Maduresisch
  • Maithili
  • Malagassisch
  • Malaiisch
  • Malayalam
  • Maledivisch
  • Malinke-sprache
  • Maltesisch
  • Manchu
  • Mandaresisch
  • Manx
  • Maori-sprache
  • Marathi
  • Marschallesisch
  • Massai-sprache
  • Maya-sprachen
  • Mazedonisch
  • Meithei-sprache
  • Miao-sprachen
  • Micmac-sprache
  • Mittelenglisch (1100-1500)
  • Mittelfranzoesisch (ca. 1400-1600)
  • Mittelhochdeutsch (ca. 1050-1500)
  • Mittelirisch (900-1200)
  • Mittelniederlaendisch (ca. 1050-1350)
  • Mohawk-sprache
  • Mon-khmer-sprachen
  • Mongolisch
  • Montenegrinisch
  • Mossi-sprache
  • Mundart
  • Muskogee-sprachen
  • Nahuatl
  • Navajo-sprache
  • Ndebele-sprache (nord)
  • Ndebele-sprache (sued)
  • Ndonga
  • Neapolitanisch
  • Nepali
  • Neugriechisch (nach 1453)
  • Neumelanesisch
  • Newari
  • Niederdeutsch
  • Niederlaendisch
  • Nigerkordofanische Sprachen
  • Nogaiisch
  • Nordfriesisch
  • Nordsaamisch
  • Norwegisch (bokmal)
  • Nubische Sprachen
  • Nyanja-sprache
  • Nyankole
  • Nyoro
  • Obersorbisch
  • Obwaldner Mundart
  • Ojibwa-sprache
  • Okzitanisch (nach 1500)
  • Oriya-sprache
  • Osmanisch
  • Ossetisch
  • Palau
  • Pali
  • Pandschabi-sprache
  • Papiamento
  • Papuasprachen
  • Paschtu
  • Pehlewi
  • Persisch
  • Philippinen-austronesisch
  • Phoenikisch
  • Plattdeutsch
  • Polnisch
  • Polyglott
  • Portugiesisch
  • Prakrit
  • Quechua-sprache
  • Raetoromanisch
  • Rajasthani
  • Romani
  • Romanisch
  • Romanische Sprachen
  • Ruhrdeutsch
  • Rumaenisch
  • Rundi-sprache
  • Russisch
  • Rwanda-sprache
  • Saamisch
  • Saarlaendisch
  • Saechsisch
  • Salish-sprache
  • Samoanisch
  • Sango-sprache
  • Sanskrit
  • Santali
  • Sardisch
  • Schaffhauser Mundart
  • Schona-sprache
  • Schottisch
  • Schwaebisch
  • Schwedisch
  • Schweizerdeutsch
  • Semitische Sprachen
  • Serbisch
  • Sidamo
  • Sindhi-sprache
  • Singhalesisch
  • Sinotibetische Sprachen
  • Sioux-sprachen
  • Slave (athapaskische Sprachen)
  • Slawische Sprachen
  • Slowakisch
  • Slowenisch
  • Solothurner Mundart
  • Somali
  • Soninke-sprache
  • Sorbisch
  • Sotho-sprache (nord)
  • Sotho-sprache (sued)
  • Spanisch
  • Sumerisch
  • Sundanesisch
  • Swahili
  • Swazi
  • Syrisch
  • Tadschikisch
  • Tagalog
  • Tahitisch
  • Tamaseq
  • Tamil
  • Tatarisch
  • Telugu-sprache
  • Temne
  • Tetum-sprache
  • Thailaendisch
  • Thaisprachen (andere)
  • Tibetisch
  • Tigre-sprache
  • Tigrinya-sprache
  • Tlingit-sprache
  • Tonga (bantusprache, Malawi)
  • Tongaisch (sprache Auf Tonga)
  • Tschagataisch
  • Tschechisch
  • Tschetschenisch
  • Tschuwaschisch
  • Tsonga-sprache
  • Tswana-sprache
  • Tuerkisch
  • Tumbuka
  • Tupi-sprache
  • Turkmenisch
  • Udmurt-sprache
  • Ugaritisch
  • Uigurisch
  • Ukrainisch
  • Unbestimmt
  • Ungarisch
  • Urdu
  • Usbekisch
  • Vai-sprache
  • Venda-sprache
  • Verschiedene Sprachen
  • Vietnamesisch
  • Volapuek
  • Volta-comoe-sprachen
  • Wakashanisch
  • Walamo-sprache
  • Walisisch
  • Walliser Mundart
  • Wallonisch
  • Weissrussisch
  • Welthilfssprache
  • Westfriesisch
  • Wienerisch
  • Wolof-sprache
  • Xhosa-sprache
  • Yao-sprache
  • Yoruba-sprache
  • Yupik-sprache
  • Zapotekisch
  • Zeichensprache
  • Zhuang
  • Zuerichdeutsch
  • Zulu
  • Relevanz
  • Autor
  • Erscheinungsjahr
  • Preis
  • Titel
  • Verlag
Zwischen und
Kriterien zurücksetzen

Open Source Intelligence Methods and Tools (Hassan, Nihad A. / Hijazi, Rami)
Open Source Intelligence Methods and Tools
Untertitel A Practical Guide to Online Intelligence
Autor Hassan, Nihad A. / Hijazi, Rami
Verlag Springer Nature EN
Co-Verlag Apress (Imprint/Brand)
Sprache Englisch
Einband Kartonierter Einband (Kt)
Erscheinungsjahr 2018
Seiten 354 S.
Artikelnummer 25822921
ISBN 978-1-4842-3212-5
Auflage 1st ed.
CHF 77.00
Zusammenfassung
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.

The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. 

Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. 

What You'll Learn

  • Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
  • Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers
  • Gather corporate intelligence about business competitors and predict future marketdirections
  • Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter
  • Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs


Who This Book Is For

Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.

The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will beaware of how OSINT resources can be used in conducting social engineering attacks. 

Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. 

What You'll Learn:

  • Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
  • Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers
  • Gather corporate intelligence about business competitors and predict future market directions
  • Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter
  • Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed many technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber Open Source Intelligence (OSINT). Nihad has authored four books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for Open Source Intelligence resources. Nihad has a BSc honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter at @DarknessGate, and you can connect to him via LinkedIn (DarknessGate).

Rami Hijazi holds a master's degree in information technology (information security) from the University of Liverpool. He works for Mericler, Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. He also works as an information security consultant, where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerned with contingency planning.