Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / Vinny Troia.
Material type:
TextPublisher: Indianapolis, Indiana : John Wiley & Sons, Inc., 2020Description: xxxi, 503 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9781119540922
- 363.25968 T745h
- HV8079.C65 T76 2020
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 363.25968 T745h 2020 (Browse shelf(Opens below)) | 1-3 | Available | 025271 | ||
Books
|
Main Library | Circulation Section | CIR 363.25968 T745h 2020 (Browse shelf(Opens below)) | 2-3 | Available | 028018 | ||
Books
|
Main Library | Circulation Section | CIR 363.25968 T745h 2020 (Browse shelf(Opens below)) | 3-3 | Available | 029321 |
Browsing Main Library shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| CIR 363.25968 H742c 2022 Cybercrime and digital forensics : an introduction / | CIR 363.25968 M867d 2023 Digital forensics in the era of artificial intelligence / | CIR 363.25968 R27m 2019 Mobile forensic investigations : a guide to evidence collection, analysis, and presentation / | CIR 363.25968 T745h 2020 Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / | CIR 363.25968 T745h 2020 Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / | CIR 363.25968 T745h 2020 Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques / | CIR 363.34 D630 2014 Disasters |
Includes index.
Getting started -- Investigations and threat actors -- Network exploration -- Manual network exploration -- Looking for network activity (Advanced NMAP techniques) -- Automated tools for network discovery -- Web exploration -- Website information gathering -- Directory hunting -- Search engine dorks -- WHOIS -- Certificate transparency and internet archives -- Iris by domain tools -- Digging for gold -- Document metadata -- Interesting places to look -- Publicly accessible data storage -- People hunting -- Researching people, images, and locations -- Searching social media -- Profile tracking and password reset clues -- Passwords, dumps and data viper -- Interacting with threat actors -- Cutting through the disinformation of a 10-million-dollar hack.
There are no comments on this title.