Vendeur : gudrunsbooks, WADHURST, Royaume-Uni
Edition originale
EUR 21,74
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierSoft cover. Etat : Near Fine. Etat de la jaquette : Near Fine. 1st Edition. First Ed. No inscriptions. The card covers are bright and clean with no shelf wear. The 354 pages of the book are bright and clean and the spine is tight. Minimal bit of thumbing to bottom corner of back card cover(not really very noticeable). Being sold by a longstanding UK bookseller and not a mass lister. This means that the book is just as described, is not ex-library and is not damaged in any other way . Light to post within the UK. Overseas order will incur an extra postal charge. A very good copy.
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
EUR 20,14
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. Used book that is in clean, average condition without any missing pages.
Vendeur : Bookmans, Tucson, AZ, Etats-Unis
EUR 17,98
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : Good. Some shelf wear Satisfaction 100% guaranteed.
Edité par Apress Media, USA, 2017
Vendeur : Entelechy Books, London, Royaume-Uni
EUR 17,75
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierSoft cover. Etat : As New. Digital Privacy and Security Using Windows. By Nihad A. Hassan & Rami Hijazi. Subtitled: A Practical Guide. Soft cover publication in as new condition.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 40,92
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 38,36
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New.
EUR 48,30
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future marketdirectionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 34,32
Autre deviseQuantité disponible : 6 disponible(s)
Ajouter au panierEtat : New.
Edité par Elservier Publishing Company, USA, 2017
Vendeur : Entelechy Books, London, Royaume-Uni
EUR 23,66
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierSoft cover. Etat : As New. Data Hiding Techniques in Windows OS. By Nihad Ahmad Hassan & Rami Hijazi. Subtitled: A Practical Approach to Investigation and Defense. Soft cover publication in as new condition.
EUR 50,40
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future marketdirectionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 43,30
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 1st edition. 324 pages. 10.50x8.25x0.75 inches. In Stock.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 39,22
Autre deviseQuantité disponible : 6 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 45,25
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 218 pages. 9.75x7.00x0.75 inches. In Stock.
EUR 55,52
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future marketdirectionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 53,97
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 54,12
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
EUR 51,92
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 43,58
Autre deviseQuantité disponible : 6 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 59,83
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future marketdirectionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises.
EUR 52,81
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 52,58
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPaperback. Etat : New.
EUR 53,92
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 48,19
Autre deviseQuantité disponible : 6 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 61,82
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 56,52
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 335 pages. 9.75x6.75x1.00 inches. In Stock.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 56,96
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 354 pages. 9.75x7.00x1.00 inches. In Stock.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 51,56
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 52,28
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Syngress Media,U.S., US, 2016
ISBN 10 : 0128044497 ISBN 13 : 9780128044490
Langue: anglais
Vendeur : Rarewaves.com UK, London, Royaume-Uni
EUR 69,06
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback. Etat : New. "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS and multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behi.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 60,43
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPaperback. Etat : New.