NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Hunting cyber criminals : (Record no. 12681)

MARC details
000 -LEADER
fixed length control field 06322cam a2200841 i 4500
001 - CONTROL NUMBER
control field on1138570732
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125542.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200203s2020 inua of 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency YDX
Modifying agency YDXIT
-- DG1
-- TEFOD
-- OCLCF
-- RECBK
-- YDX
-- N$T
-- EBLCP
-- UKMGB
-- OCLCQ
-- UMI
-- OCLCO
-- MUB
-- OCLCQ
-- COO
-- UKAHL
-- VT2
-- OCLCO
-- IEEEE
-- K6U
-- OCLCQ
-- OCLCO
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC037538
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 019739205
Source Uk
019 ## -
-- 1138676136
-- 1222919675
-- 1239767904
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119540895
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119541004
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111954100X
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119540991
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119540992
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119540892
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119540925
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119540922
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119541004
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066784731
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001078739
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 583494080
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 019739205
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000068857094
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1138570732
Canceled/invalid control number (OCoLC)1138676136
-- (OCoLC)1222919675
-- (OCoLC)1239767904
037 ## - SOURCE OF ACQUISITION
Stock number 9561C36F-4D93-4000-9E55-EE5B48FBDA9A
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
037 ## - SOURCE OF ACQUISITION
Stock number 9820814
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
Item number T76 2020
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.2596/8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Troia, Vinny,
Relator term author.
245 10 - TITLE STATEMENT
Title Hunting cyber criminals :
Remainder of title a hacker's guide to online intelligence gathering tools and techniques /
Statement of responsibility, etc. Vinny Troia.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, Indiana :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Network Exploration. Getting Started -- Investigations and Threat Actors -- Network Exploration -- Manual Network Exploration -- Looking for Network Activity (Advanced NMAP Techniques) -- Automated Tools for Network Discovery -- Web Exploration. Web Exploration -- Website Information Gathering -- Directory Hunting -- Search Engine Dorks -- WHOIS -- Certificate Transparency and Internet Archives -- Iris by DomainTools -- Digging for Gold. Digging for Gold -- Document Metadata -- Interesting Places to Look -- Publicly Accessible Data Storage -- People Hunting. People Hunting -- Researching People, Images, and Locations -- Searching Social Media -- Profile Tracking and Password Reset Clues -- Passwords, Dumps, and Data Viper -- Interacting with Threat Actors -- Cutting through the Disinformation of a 10-Million-Dollar Hack -- Epilogue.
500 ## - GENERAL NOTE
General note Includes index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from digital title page (viewed on February 12, 2020).
520 ## - SUMMARY, ETC.
Summary, etc. The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: -Through the eyes of the author who has several years of experience in the subject.-Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets.-Through the eyes of industry leaders. This book is ideal for:Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers
Form subdivision Handbooks, manuals, etc.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Criminalit�e informatique
General subdivision Enqu�etes.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Piratage informatique.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Pirates informatiques
Form subdivision Guides, manuels, etc.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- Network Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
Source of heading or term fast
655 #2 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Handbook
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term handbooks.
Source of term aat
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Handbooks and manuals
Source of term fast
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Handbooks and manuals.
Source of term lcgft
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Guides et manuels.
Source of term rvmgf
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Hunting cyber criminals (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCG9WGyr4gpGyjjqPpfKmVC
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 1119540925
-- 9781119540922
Record control number (OCoLC)1097252336
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119541004</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH36899985
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6029121
938 ## -
-- EBSCOhost
-- EBSC
-- 2362602
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00811910
938 ## -
-- YBP Library Services
-- YANK
-- 16322755
938 ## -
-- YBP Library Services
-- YANK
-- 16634352
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha