The OSINT Handbook

The OSINT Handbook

Dale Meredith

48,04 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
Materia
Internet: obras generales
ISBN:
9781837638277
48,04 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Get to grips with top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threatsFree with your book: DRM-free PDF version + access to Packt’s next-gen Reader*Key Features:- Familiarize yourself with the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng- Develop an OSINT-driven threat intelligence program to mitigate cyber risks- Leverage the power of information through OSINT with real-world case studiesBook Description:The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities and counter the surge in online threats that this powerful toolset was built to tackle.Starting with an introduction to the concept of OSINT, this book will take you through all the applications, as well as the legal and ethical considerations associated with OSINT research. You’ll conquer essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, you’ll get to grips with anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You’ll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you’ll be equipped with both the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT.*Email sign-up and proof of purchase requiredWhat You Will Learn:- Work with real-life examples of OSINT in action and discover best practices- Automate OSINT collection and analysis- Harness social media data for OSINT purposes- Manage your digital footprint to reduce risk and maintain privacy- Uncover and analyze hidden information within documents- Implement an effective OSINT-driven threat intelligence program- Leverage OSINT techniques to enhance organizational securityWho this book is for:This book is for ethical hackers and security professionals who want to expand their cybersecurity toolbox and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required.Table of Contents- The Secrets Hiding in Plain Sight - Unveiling the Power of OSINT- Invisible and Untouchable - The Importance of Anonymity in OSINT Analysis- The OSINT Toolbox - Methods and Techniques for Gathering and Analyzing Information- Exploring the Unknown - How Discovery Tools Reveal Hidden Information- From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools- The Eyes and Ears of Threat Intelligence - How OSINT Helps Mitigate Cyber Risks- Protecting Your Identity and Organization from Cyber Threats

Artículos relacionados

  • Web Portals
    Arthur Tatnall
    ...
  • Organizational Communication and Sustainable Development
    Although social, economical, and environmental sustainability has become increasingly important in this era of globalization, little effort has been put forth to investigate the social and cultural impact. Organizational Communication and Sustainable Development: ICTs for Mobility explores how mobility meets sustainability in contemporary organizational communication. A compend...
  • Cases on Global E-Learning Practices
    Remesh C. Sharma / Remesh CSharma
    ...
  • Etransformation in Governance
    ...
  • Web Services Security Development and Architecture
    CARLOS GUTIÉRREZ
    Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full developme...
  • Internet Strategy
    Matthew W. Guah / Matthew WGuah / Wendy L. Currie / Wendy LCurrie
    ...

Otros libros del autor

  • Hacking Tricks, Methods, and Offensive Strategies
    Dale Meredith
    Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them.This book guides you through the entire hacking lifecycle, starti...
    Disponible

    48,65 €

  • Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
    Dale Meredith
    Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification examKey Features- Learn how to look at technology from the standpoint of an attacker- Understand the methods that attackers use to infiltrate networks- Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsBook Descript...
    Disponible

    75,34 €