000 | 03271nam a2200793 i 4500 | ||
---|---|---|---|
001 | 9781948976718 | ||
003 | BEP | ||
005 | 20241023114912.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 190331s2019 nyu o 001 0 eng d | ||
020 |
_a9781948976718 _qe-book |
||
035 | _a(OCoLC)1096283052 | ||
035 | _a(CaBNVSL)slc48976718 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aD'Agostino, Giulio, _eauthor. |
|
245 | 1 | 0 |
_aConversations in cyberspace / _cGiulio D'Agostino. |
264 | 1 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c[(c)2019.] |
|
300 | _a1 online resource (178 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 |
_aBusiness law and corporate risk management collection, _x2333-6730 |
|
500 | _aIncludes index. | ||
505 | 0 |
_aChapter 1. Introduction -- _tChapter 2. Conversations in cyberspace. |
|
506 | _aAccess restricted to authorized users and institutions. | ||
520 | 3 | _aA collection of insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence (OSINT)tools and a selection of interviews with some of the key figures in industrial control systems (ICS), advanced persistent threat (APT) and online/deep web members organizations.It aims to be an introduction to the relationships between security, OSINT and the vast and complex world hiding in the deep web. The information provided will be beneficial to security professionals and system administrators interested in exploring today's concerns in database design, privacy and security-by-design, and deep web members organizations, including Cicada 3301, the Unknowns, Anonymous, and more. | |
530 |
_a2 _ub |
||
530 | _aAlso available in printing. | ||
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aDescription based on PDF viewed 03/31/2019. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aDark Web. | |
650 | 0 | _aCyberspace. | |
653 | _aDeepweb. | ||
653 | _aDark Web. | ||
653 | _aHacker. | ||
653 | _aHacktivist. | ||
653 | _aCybersecurity. | ||
653 | _aCicada 3301. | ||
653 | _aThe unknowns. | ||
653 | _aAnonymous. | ||
653 | _aAtlayo. | ||
653 | _aGrams. | ||
653 | _aTorch. | ||
653 | _aHidden Wiki. | ||
653 | _aTor. | ||
653 | _aPodesta emails. | ||
653 | _aGreg Walton. | ||
653 | _aCyberspace. | ||
653 | _aSecurity. | ||
653 | _aPrivacy. | ||
653 | _aCryptography. | ||
653 | _aGCHQ. | ||
653 | _aGDPR. | ||
653 | _aDebian. | ||
653 | _aLinux. | ||
653 | _aMaltego. | ||
653 | _aAl. | ||
655 | 0 | _a[genre] | |
655 | 0 | _aElectronic books | |
776 | 0 | 8 |
_iPrint version: _z9781948976701 |
830 | 0 |
_aBusiness law and corporate risk management collection. _x2333-6730 |
|
856 | 4 | 0 | _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000854.html |
942 |
_2lcc _bCIU _cOB _eBEP _QOL _zBEP9781948976718 |
||
999 |
_c73537 _d73537 |
||
902 |
_c1 _dCynthia Snell |