Hunting cyber criminals : (Record no. 12681)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06322cam a2200841 i 4500 |
001 - CONTROL NUMBER | |
control field | on1138570732 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200203s2020 inua of 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | YDX |
Modifying agency | YDXIT |
-- | DG1 |
-- | TEFOD |
-- | OCLCF |
-- | RECBK |
-- | YDX |
-- | N$T |
-- | EBLCP |
-- | UKMGB |
-- | OCLCQ |
-- | UMI |
-- | OCLCO |
-- | MUB |
-- | OCLCQ |
-- | COO |
-- | UKAHL |
-- | VT2 |
-- | OCLCO |
-- | IEEEE |
-- | K6U |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBC037538 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 019739205 |
Source | Uk |
019 ## - | |
-- | 1138676136 |
-- | 1222919675 |
-- | 1239767904 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119540895 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119541004 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 111954100X |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119540991 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119540992 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119540892 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119540925 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119540922 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119541004 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000066784731 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001078739 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 583494080 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 019739205 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000068857094 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1138570732 |
Canceled/invalid control number | (OCoLC)1138676136 |
-- | (OCoLC)1222919675 |
-- | (OCoLC)1239767904 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9561C36F-4D93-4000-9E55-EE5B48FBDA9A |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9820814 |
Source of stock number/acquisition | IEEE |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV8079.C65 |
Item number | T76 2020 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.2596/8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Troia, Vinny, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Hunting cyber criminals : |
Remainder of title | a hacker's guide to online intelligence gathering tools and techniques / |
Statement of responsibility, etc. | Vinny Troia. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, Indiana : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | [2020] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Network Exploration. Getting Started -- Investigations and Threat Actors -- Network Exploration -- Manual Network Exploration -- Looking for Network Activity (Advanced NMAP Techniques) -- Automated Tools for Network Discovery -- Web Exploration. Web Exploration -- Website Information Gathering -- Directory Hunting -- Search Engine Dorks -- WHOIS -- Certificate Transparency and Internet Archives -- Iris by DomainTools -- Digging for Gold. Digging for Gold -- Document Metadata -- Interesting Places to Look -- Publicly Accessible Data Storage -- People Hunting. People Hunting -- Researching People, Images, and Locations -- Searching Social Media -- Profile Tracking and Password Reset Clues -- Passwords, Dumps, and Data Viper -- Interacting with Threat Actors -- Cutting through the Disinformation of a 10-Million-Dollar Hack -- Epilogue. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from digital title page (viewed on February 12, 2020). |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: -Through the eyes of the author who has several years of experience in the subject.-Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets.-Through the eyes of industry leaders. This book is ideal for:Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer crimes |
General subdivision | Investigation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hacking. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hackers |
Form subdivision | Handbooks, manuals, etc. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Criminalit�e informatique |
General subdivision | Enqu�etes. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Piratage informatique. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Pirates informatiques |
Form subdivision | Guides, manuels, etc. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Network Security. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer crimes |
General subdivision | Investigation |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hackers |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hacking |
Source of heading or term | fast |
655 #2 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Handbook |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | handbooks. |
Source of term | aat |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Handbooks and manuals |
Source of term | fast |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Handbooks and manuals. |
Source of term | lcgft |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Guides et manuels. |
Source of term | rvmgf |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Hunting cyber criminals (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCG9WGyr4gpGyjjqPpfKmVC |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 1119540925 |
-- | 9781119540922 |
Record control number | (OCoLC)1097252336 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH36899985 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6029121 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 2362602 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00811910 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 16322755 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 16634352 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.