ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Deep Dive: Exploring the Real-world Value of Open Source Intelligence

دانلود کتاب Deep Dive: کاوش در ارزش واقعی هوش منبع باز

Deep Dive: Exploring the Real-world Value of Open Source Intelligence

مشخصات کتاب

Deep Dive: Exploring the Real-world Value of Open Source Intelligence

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1119933242, 9781119933243 
ناشر: Wiley 
سال نشر: 2023 
تعداد صفحات: 544
[546] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 53 Mb 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Deep Dive: Exploring the Real-world Value of Open Source Intelligence به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب Deep Dive: کاوش در ارزش واقعی هوش منبع باز نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Deep Dive
Copyright Page
About the Author
	About the Technical Editor
Acknowledgments
Contents at a Glance
Contents
Foreword
Preface
	Who is this book for?
	What can you learn?
	Areas of Focus
		Part I: Foundational OSINT
		Part II: OSINT Touchpoints
			Subject Intelligence
			Social Media Analysis
			Business and Organizational Intelligence
			Transportation Intelligence
			Critical Infrastructure and Industrial Intelligence
			Financial Intelligence
			Cryptocurrency
			Non-fungible Tokens
	Why learn OSINT skills?
Introduction
	How I got started in OSINT
Part 1 Foundational OSINT
	Chapter 1 Open Source Intelligence
		1.1 What Is OSINT?
		1.2 A Brief History of OSINT
			The Past
			The Present
			The Future
		1.3 Critical Thinking
		1.4 Mental Health
		1.5 Personal Bias
		1.6 Ethics
	Chapter 2 The Intelligence Cycle
		2.1 What Is the Intelligence Cycle?
		2.2 Planning and Requirements Phase
		2.3 Collection Phase
			The Art of Pivoting
			Overcoming OSINT Challenges
				RESET Technique
				Gap Analysis
			Why We Have So Much Data
		2.4 Documentation Methods
		2.5 Processing and Evaluation Phase
			Scoping
			Data Enrichment
		2.6 Analysis and Production Phase
			Visualizations
		2.7 Reporting
			Report Tone
			Report Design
				Example Report
		2.8 Dissemination and Consumption Phases
			Tippers
			Feedback Phase
			Challenges in the Intelligence Cycle
	Chapter 3 The Adversarial Mindset
		3.1 Getting to Know the Adversary
		3.2 Passive vs. Active Recon
	Chapter 4 Operational Security
		4.1 What Is OPSEC?
			Threat Modeling
				Persona Non Grata Method
				Security or “Baseball” Cards
				Attack Trees
		4.2 Steps for OPSEC
			Outlining the Five Steps of OPSEC
				Step 1: Define Critical Information
				Step 2: Analyze the Threat
				Step 3: Determine Vulnerabilities
				Step 4: Risk Assessment
				Step 5: Apply Countermeasures
		4.3 OPSEC Technology
			Virtual Private Network
				Why Use a VPN?
				Choosing a VPN
				VPN Concerns
			Privacy Browsers
				Tor
				Pros
				Cons
				Freenet
				Pros
				Cons
				I2P
				Pros
				Cons
			Virtual Machine
			Mobile Emulator
		4.4 Research Accounts
		4.5 Congratulations!
Part 2 OSINT Touchpoints
	Chapter 5 Subject Intelligence
		5.1 Overview
			What Is Subject Intelligence?
				Digital Footprint
			Examining a Subject’s Pattern of Life
		5.2 Names
			Subject Names
				Naming Conventions
				Arabic Naming Conventions
				Chinese Naming Conventions
				Russian Naming Conventions
				Name Searching Techniques
		5.3 Subject Usernames
			Username Searching Techniques
				Correlating Accounts and Subject Information by Username
		5.4 Subject Emails
			How to begin connecting accounts
				Correlating Accounts and Subject Information by Email
				Google Accounts
				Correlating an Email with a Domain
				Email Verification
				Privacy Emails
				Data Breaches
		5.5 Subject Phone Numbers
			Typing Phone Numbers to additional selectors
				Correlating a Phone Number with a Subject
				Phone Number Spoofing
		5.6 Public Records and Personal Disclosures
			Methods for incorporating public records searches
				Collecting Public Records Associated with a Subject
				U.S. Official Public Record Sources
				U.S. Unofficial Sources
	Chapter 6 Social Media Analysis
		6.1 Social Media
			Key Parts of Social Media
			Collecting Social Media Data on a Subject
				Correlating Subject Social Media Accounts
				Subject Associations and Interactions on Social Media
				User Media and Metadata
				Social Media Pivots at a Glance
		6.2 Continuous Community Monitoring
			Methods for the Continuous Monitoring of a Group
				Facebook Groups
				Telegram Channels
				Reddit
				4chan and 8kun
				I Joined a Community, Now What?
				I Am Unable to Join a Community, Can I Still Monitor Them?
		6.3 Image and Video Analysis
			How to Look at an Image/Video
			Reverse Image Searching
			Image-Based Geolocation
				Image Analysis
				Geolocation Steps
				Image Analysis
				Geolocation Steps
				Image Analysis and Geolocation for Real-Time Events
		6.4 Verification
			Misinformation, Disinformation, and Malinformation
				How Do We Verify If Content Is Mis/Dis/Mal?
				Spotting a Bot Account or Bot Network
				Visualizing and Analyzing Social Networks
				Spotting Digitally Altered Content
				Photo Manipulation
				Video Manipulation
		6.5 Putting It All Together
			Chasing a Puppy Scam
	Chapter 7 Business and Organizational Intelligence
		7.1 Overview
			What Is Organizational Intelligence?
		7.2 Corporate Organizations
			Understanding the Basics of Corporate Structure
				Entity Types
		7.3 Methods for Analyzing Organizations
			Government Sources and Official Registers
				EDGAR
			Annual Reports and Filings
				Annual Report to Shareholders
				Forms 10-K, 10-Q, and 8-K
			Digital Disclosures and Leaks
				Organizational Websites
				Social Media for Organizations
			Business Indiscretions and Lawsuits
			Contracts
				Government Contracts
				Contract Reading 101
				Power Mapping
			Tips for Analyzing Organizations Outside the United States
				Canada
				United Kingdom
			Case Study:
				China
				Russia
				Middle East
		7.4 Recognizing Organizational Crime
			Shell Corporations
				The “Tells”
		7.5 Sanctions, Blacklists, and Designations
			Organizations that designate sanctions
				The United Nations Security Council
				The Office of Foreign Assets Control
				Other Blacklists
		7.6 501(c)(3) Nonprofits
			Primary Source Documents
				IRS Form 990
				IRS Tax Exempt Organization Search
				Annual Reports
			Consumer Reports and Reviews
				Charity Navigator
		7.7 Domain Registration and IP Analysis
			An Organization’s IPs, Domain Names and Websites
				What Is an IP address?
				What Is a Domain Name?
				What Is a Website, and Why Does All of This Matter?
			Analyzing Organization Websites
				Robots.txt
				Website Design and Content
				Website Metadata
			Analyzing WHOIS Record Data
			Analyzing IP Addresses
				IP Addresses 101
				What Can I Do with an IP Address?
				Words of Caution
	Chapter 8 Transportation Intelligence
		8.1 Overview
			What Is Transportation Intelligence?
				The Criticality of Transportation Intelligence
			Visual Intelligence
				Spotters
				Social Media Disclosures
				Webcam
				Satellite Imagery
			Signal Detection
				Understanding Navigational Systems
				Dark Signals
				Signal Spoofing
				Identity Manipulation
				GNSS Jamming
				GNSS Meaconing
		8.2 Vessels
			Introduction to Maritime Intelligence
				Types of Maritime Entities
				Vessel Terminology
			Maritime Discovery and Analysis Methods
				Vessel Paths and Locations
				Vessel Meetings
				Port Calls
				Maritime Entity Ownership and Operation
				Ship-to-Shore Critical Infrastructure
			Maritime Critical Infrastructure and Entity Vulnerabilities
				Ship-to-Shore Critical Infrastructure
		8.3 Railways
			Introduction to Railway Intelligence
				Types of Railway Entities
				Railway Terminology
			Railway Discovery and Analysis Methods
				Visual Identification of Rail Lines
				Railway Routes and Schedules
				Railway Entity Ownership and Operation
			Railway Critical Infrastructure and Entity Vulnerabilities
		8.4 Aircraft
			Introduction to Aircraft Intelligence
				Types of Aircraft
				Parts of a Typical Jet
				Aircraft and Air Travel Terminology
			Aircraft Discovery and Analysis Methods
				Identifying Aircraft
				Flight Paths and Locations
				Limiting Aircraft Data Displayed and Private ICAO Addresses Listings
				Tracking Cargo
				Notice to Air Missions (NOTAMs)
				Air Traffic Control Communications
				Aerodromes
				Geolocation and Imagery Analysis of Aircraft
				Aviation Entity Ownership and Operation
			Aviation Critical Infrastructure and Entity Vulnerabilities
		8.5 Automobiles
			Introduction to Automotive Intelligence
				Types of Automobile Entities
				Automobile Terminology
			Automobile Discovery and Analysis Methods
				Identifying Automobiles
				Tips for Monitoring and Analyzing Automobile Routes
				Automobile Entity Ownership and Operation
			Automobile Security and Technology
	Chapter 9 Critical Infrastructure and Industrial Intelligence
		9.1 Overview of Critical Infrastructure and Industrial Intelligence
			What Is Operational Technology?
			What Is IoT and IIoT?
		9.2 Methods for the Analysis of Critical Infrastructure, OT, and IoT Systems
			Planning the Analysis
				Five Possible Information Gathering Avenues
			Visualizations
				Plotting Locations with Google Earth Pro
				Using Premade Visualizations
			Public Disclosures
				Contracts
				Social Media
				Job Advertisements
				Company Disclosures
			Infrastructure Search Tools
				Censys.io
				Kamerka
		9.3 Wireless
			Overview of Wireless Networks
				Mobile Networks
				War Driving
			Low-Power Wide-Area Networks
				Long Range Radio (LoRa)
			Wireless SSID, BSSID, MAC
				Service Set Identifier (SSID)
				Basic Service Set Identifier (BSSID)
				Extended Service Set Identifier (ESSID)
				Media Access Control (MAC) Address
		9.4 Methods for Analyzing Wireless Networks
			Information Gathering Techniques
				Here are some pivots for wireless network information gathering
			Wi-Fi Searching Techniques
				WiGLE
				Plotting Wireless Locations with Google Earth Pro
			Tower Searching Techniques
	Chapter 10 Financial Intelligence
		10.1 Overview
			Financial Organizations
				Financial Intelligence Units
				Financial Crimes Enforcement Network
				The Financial Action Task Force
				The Federal Deposit Insurance Corporation
				International Monetary Fund
				Federal Financial Institutions Examination Council
				The Office of Foreign Assets Control
		10.2 Financial Crime and Organized Crime, Together Forever <3
			Transnational Criminal Organizations
			Politically Exposed Person
			Anti-Money Laundering
			The Counter Financing of Terrorism
			Tax Evasion, Tax Fraud, and Embezzlement
		10.3 Methods for Analysis
			Financial Identifiers
				Issuer Identification Number
				Routing Number (ABA Routing Numbers)
				Society for Worldwide Interbank Financial Organization
				Value-Added Tax
				BIN-Bank Identification Number
			Location-Based Resources
			Drug Financing Analysis Resources
			Organized Crime Analysis Resources
			Negative News String Searching
	Chapter 11 Cryptocurrency
		11.1 Overview of Cryptocurrency
			The Basics of Cryptocurrency
				How Is Cryptocurrency Used and Transferred?
				What Is a Cryptocurrency Wallet?
				What Is Blockchain?
			Types of Cryptocurrencies
				Coin and Token Quick Reference
				Bitcoin
				Ether
				Binance
				Tether
				Solana
				Dogecoin
				Monero (XMR)
			What Is Cryptocurrency Mining and Minting?
				Types of Verification
				Public Blockchains vs. Private Blockchains
			Why Tracking Cryptocurrency Matters
				Money Laundering
				Fraud, Illegal Sales, and CSAM/CSEM
		11.2 The Dark Web
			Overview of the Dark Web
			Darknet Marketplaces
		11.3 Methods for Cryptocurrency Analysis
			Where to Begin?
			Starting with a Subject of Interest
				Baselining
				Starting Wide
				Narrowing Focus
				Layering
			Starting with a Wallet of Interest
				Baselining
				Starting Wide
				Narrowing Focus
				Layering
				Tracing Cash-Outs at the Exchange Point
				Following Cryptocurrency Mining Scripts
			Starting with a Transaction of Interest
				Baselining
				Starting Wide
				Narrowing Focus
				Layering
	Chapter 12 Non-fungible Tokens
		12.1 Overview of Non-fungible Tokens
			NFT Crimes
				Ponzi Schemes and Rug Pulls
				Fake NFTs
				Get Rich Quick
				Phishing
		12.2 Methods for Analyzing NFTs
			By Wallet Number or Address
			By Image
				What Is ENS?
				Look for Metadata
	Chapter 13 What’s Next?
		13.1 Thank You for Diving In with Me
			Important Reminders
				Take Care of Yourself
				Use Your Skill for Good
				Never Stop Learning
				Always Maintain Good OPSEC
Index
EULA




نظرات کاربران