دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Alexandre DeGarmo
سری:
ناشر: Alexandre DeGarmo
سال نشر: 2023
تعداد صفحات: 265
زبان: English
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 4 Mb
در صورت تبدیل فایل کتاب The OSINT Codebook : Cracking Open Source Intelligence Strategies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کتاب کد OSINT: ترک استراتژی های اطلاعاتی منبع باز نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Title Page The OSINT Codebook : Cracking Open Source Intelligence Strategies Chapter 1: Introduction to OSINT: Understanding Open Source Intelligence 1.1 What is OSINT and Why is it Important? 1.2 Historical Evolution of OSINT 1.3 OSINT vs. Other Intelligence Types 1.4 Key Players and Organizations in OSINT 1.5 Legal and Ethical Considerations in OSINT Chapter 2: Building a Foundation: Essential Tools and Techniques for OSINT 2.1 Setting up an OSINT Workspace 2.2 Effective Search Engines for OSINT Investigations 2.3 Browser Extensions and Plugins for OSINT 2.4 Anonymity and Privacy Tools for Researchers 2.5 Automating OSINT with Scripts and APIs Chapter 3: Navigating the Digital Footprint: Tracing Online Identities 3.1 OSINT Frameworks for Identifying Individuals 3.2 Tracking Social Media Accounts and Online Activity 3.3 Leveraging WHOIS and Domain Registration Data 3.4 Tracing Email Addresses and Online Communications 3.5 Utilizing OSINT to Reveal Relationships and Connections Chapter 4: Social Media Mining: Extracting Insights from Social Networks 4.1 Understanding Social Media OSINT and Risks 4.2 Analyzing User Profiles and Publicly Available Information 4.3 Monitoring Social Media Trends and Discussions 4.4 Geolocation on Social Media: Pinpointing User Locations 4.5 Extracting Valuable Data from Closed Groups and Private Accounts Chapter 5: Web Scraping and Data Harvesting: Gathering Information from Websites 5.1 Introduction to Web Scraping and Crawling 5.2 Extracting Structured Data from Websites 5.3 Scraping Unstructured Data: Text and Media Content 5.4 Avoiding Legal and Ethical Pitfalls in Web Scraping 5.5 Automating Web Scraping with Python and other Tools Chapter 6: Investigating Digital Communities: Forums, Blogs, and Online Discussions 6.1 Navigating Online Forums and Discussion Boards 6.2 Extracting Valuable Intelligence from Forum Threads 6.3 Analyzing Blog Posts and Comments for Insights 6.4 Social Engineering Techniques in Digital Communities 6.5 Identifying and Verifying Expert Sources in Online Discussions Chapter 7: OSINT through Multimedia: Analyzing Images and Videos 7.1 Image Metadata: Understanding the Hidden Information 7.2 Reverse Image Search for Identifying Duplicates and Sources 7.3 Video Analysis: Identifying Locations and Timeframes 7.4 Image and Video Deepfakes: Detecting Manipulations 7.5 Extracting Text and Context from Images and Videos Chapter 8: Unraveling the World of Geolocation: Mapping and Tracking Targets 8.1 Introduction to Geolocation in OSINT 8.2 Geotagging: Extracting Location Data from Photos and Posts 8.3 Mapping Geolocation Data with GIS Tools 8.4 Geolocation Analysis for Incident Response and Forensics 8.5 Real-Time Geolocation Tracking for OSINT Operations Chapter 9: The Power of Metadata: Extracting Hidden Clues from Files 9.1 Understanding Metadata in Digital Files 9.2 Extracting Metadata from Documents, Images, and Media 9.3 Geolocation and Time Stamps in File Metadata 9.4 Analyzing Encrypted and Compressed Files for Metadata 9.5 Metadata Removal and Anonymization Techniques Chapter 10: Advanced Search Techniques: Mastering OSINT Queries 10.1 Google Dorking: Advanced Google Search Operators 10.2 OSINT Search Engines and Specialized Tools 10.3 Customizing Search Queries for Targeted Results 10.4 Leveraging OSINT APIs for Comprehensive Intelligence 10.5 Cross-Referencing and Verifying Information from Multiple Sources Chapter 11: Dark Web Exploration: Safely Venturing into Hidden Networks 11.1 Understanding the Dark Web and Its Components 11.2 Anonymity and Security Measures for Dark Web Research 11.3 Accessing Hidden Services and Marketplaces 11.4 Identifying Criminal Activities and Threats on the Dark Web 11.5 Reporting Dark Web Findings to Law Enforcement Chapter 12: Analyzing OSINT for Threat Intelligence and Security Assessments 12.1 OSINT as a Key Element of Threat Intelligence 12.2 Mapping Cyber Threats and Attack Surfaces with OSINT 12.3 Analyzing Social Engineering Attempts through OSINT 12.4 OSINT for Vulnerability Assessment and Penetration Testing 12.5 Building an Effective Threat Intelligence Program with OSINT Chapter 13: Privacy and Ethical Considerations in OSINT Investigations 13.1 Respecting Privacy Rights in OSINT Practices 13.2 Legal and Regulatory Frameworks for OSINT Research 13.3 Ethical Dilemmas and Decision-Making in OSINT 13.4 Safeguarding OSINT Data and Research Findings 13.5 Ensuring Confidentiality and Anonymity in OSINT Work Chapter 14: OSINT for Competitive Intelligence: Understanding Your Rivals 14.1 The Role of OSINT in Competitive Intelligence (CI) 14.2 Identifying Competitors and Their Digital Footprints 14.3 Analyzing Competitor Strategies and Market Insights 14.4 OSINT in Product Development and Positioning 14.5 CI Reporting and Recommendations from OSINT Research Chapter 15: The Future of OSINT: Trends, Challenges, and Emerging Technologies 15.1 Evolving Threat Landscape and OSINT Requirements 15.2 Leveraging AI and Machine Learning in OSINT 15.3 OSINT Fusion Centers: Collaboration and Information Sharing 15.4 Mitigating Disinformation and Fake News with OSINT 15.5 Ethical Hacking and OSINT Integration for Enhanced Security