skip to content
Open source intelligence methods and tools : a practical guide to online intelligence Preview this item
ClosePreview this item
Checking...

Open source intelligence methods and tools : a practical guide to online intelligence

Author: Nihad A Hassan; Rami Hijazi
Publisher: [United States] : Apress, New York, NY : Distributed to the Book trade worldwide by Springer 2018. ©2018
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Hassan, Nihad A.
Open source intelligence methods and tools.
[United States] : Apress, 2018
(OCoLC)1022082298
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Nihad A Hassan; Rami Hijazi
ISBN: 9781484232132 1484232135 1484232127 9781484232125
OCLC Number: 1043830928
Description: 1 online resource (xxiii, 354 pages) : illustrations
Contents: Chapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell --
Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources --
Chapter 3: The Underground Internet: Diving Beneath the Surface Internet --
Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines --
Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites --
Chapter 6: People Search Engines and Public Records: Find People Related Information Online --
Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information --
Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure --
Chapter 9: Conclusion: What's Next?.-
Responsibility: Nihad A. Hassan, Rami Hijazi.

Abstract:

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1043830928> # Open source intelligence methods and tools : a practical guide to online intelligence
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "1043830928" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/xxu> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5326549972#Topic/open_source_software> ; # Open source software
    schema:about <http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:author <http://experiment.worldcat.org/entity/work/data/5326549972#Person/hassan_nihad_a> ; # Nihad A. Hassan
    schema:author <http://experiment.worldcat.org/entity/work/data/5326549972#Person/hijazi_rami> ; # Rami Hijazi
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2018." ;
    schema:datePublished "2018" ;
    schema:description "Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs."@en ;
    schema:description "Chapter 1: The Evolution of Open Source Intelligence (OSINT): OSINT in a Nutshell -- Chapter 2: Setting the Stage: What You Should Do Before You Begin Gathering OSINT Sources -- Chapter 3: The Underground Internet: Diving Beneath the Surface Internet -- Chapter 4: Search Engine Techniques: How to Retrieve Accurate Results From Search Engines -- Chapter 5: Social Media Intelligence: Conduct Advanced Searches on Social Media Sites -- Chapter 6: People Search Engines and Public Records: Find People Related Information Online -- Chapter 7: Online Maps: Gathering Intelligence from Geolocation Information -- Chapter 8: Technical Footprinting: Gathering Intelligence from Target Public IT Infrastructure -- Chapter 9: Conclusion: What's Next?.-"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5326549972> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1022082298> ;
    schema:name "Open source intelligence methods and tools : a practical guide to online intelligence"@en ;
    schema:productID "1043830928" ;
    schema:url <http://proquestcombo.safaribooksonline.com/9781484232132> ;
    schema:url <https://www.books24x7.com/marc.asp?bookid=142755> ;
    schema:url <https://doi.org/10.1007/978-1-4842-3213-2> ;
    schema:url <http://ezproxy.library.yorku.ca/sso/skillport?context=142755> ;
    schema:url <https://link.springer.com/book/10.1007%2F978-1-4842-3212-5> ;
    schema:url <https://www.safaribooksonline.com/library/view//9781484232132/?ar> ;
    schema:url <https://link.springer.com/book/10.1007%2F978-1-4842-3213-2> ;
    schema:url <https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1842427> ;
    schema:url <https://shu-primo.hosted.exlibrisgroup.com/openurl/44SHU/44SHU_VU1?u.ignore_date_coverage=true&rft.mms_id=99257722102501> ;
    schema:url <https://proquest.safaribooksonline.com/9781484232132> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5446001> ;
    schema:workExample <http://worldcat.org/isbn/9781484232132> ;
    schema:workExample <http://worldcat.org/isbn/9781484232125> ;
    schema:workExample <http://dx.doi.org/10.1007/978-1-4842-3213-2> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB912982> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1043830928> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5326549972#Person/hassan_nihad_a> # Nihad A. Hassan
    a schema:Person ;
    schema:familyName "Hassan" ;
    schema:givenName "Nihad A." ;
    schema:name "Nihad A. Hassan" ;
    .

<http://experiment.worldcat.org/entity/work/data/5326549972#Person/hijazi_rami> # Rami Hijazi
    a schema:Person ;
    schema:familyName "Hijazi" ;
    schema:givenName "Rami" ;
    schema:name "Rami Hijazi" ;
    .

<http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5326549972#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5326549972#Topic/open_source_software> # Open source software
    a schema:Intangible ;
    schema:name "Open source software"@en ;
    .

<http://worldcat.org/isbn/9781484232125>
    a schema:ProductModel ;
    schema:isbn "1484232127" ;
    schema:isbn "9781484232125" ;
    .

<http://worldcat.org/isbn/9781484232132>
    a schema:ProductModel ;
    schema:isbn "1484232135" ;
    schema:isbn "9781484232132" ;
    .

<http://www.worldcat.org/oclc/1022082298>
    a schema:CreativeWork ;
    rdfs:label "Open source intelligence methods and tools." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1043830928> ; # Open source intelligence methods and tools : a practical guide to online intelligence
    .

<http://www.worldcat.org/title/-/oclc/1043830928>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1043830928> ; # Open source intelligence methods and tools : a practical guide to online intelligence
    schema:dateModified "2019-12-11" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<https://shu-primo.hosted.exlibrisgroup.com/openurl/44SHU/44SHU_VU1?u.ignore_date_coverage=true&rft.mms_id=99257722102501>
    rdfs:comment "Springer link professional and applied computing 2017 and 2018" ;
    rdfs:comment "Professional and Applied Computing (Springer-12059)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.