000 03271nam a2200793 i 4500
001 9781948976718
003 BEP
005 20241023114912.0
006 m eo d
007 cr cn |||m|||a
008 190331s2019 nyu o 001 0 eng d
020 _a9781948976718
_qe-book
035 _a(OCoLC)1096283052
035 _a(CaBNVSL)slc48976718
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.9.A25
100 1 _aD'Agostino, Giulio,
_eauthor.
245 1 0 _aConversations in cyberspace /
_cGiulio D'Agostino.
264 1 _aNew York, New York (222 East 46th Street, New York, NY 10017) :
_bBusiness Expert Press,
_c[(c)2019.]
300 _a1 online resource (178 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aBusiness law and corporate risk management collection,
_x2333-6730
500 _aIncludes index.
505 0 _aChapter 1. Introduction --
_tChapter 2. Conversations in cyberspace.
506 _aAccess restricted to authorized users and institutions.
520 3 _aA collection of insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence (OSINT)tools and a selection of interviews with some of the key figures in industrial control systems (ICS), advanced persistent threat (APT) and online/deep web members organizations.It aims to be an introduction to the relationships between security, OSINT and the vast and complex world hiding in the deep web. The information provided will be beneficial to security professionals and system administrators interested in exploring today's concerns in database design, privacy and security-by-design, and deep web members organizations, including Cicada 3301, the Unknowns, Anonymous, and more.
530 _a2
_ub
530 _aAlso available in printing.
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat reader.
588 _aDescription based on PDF viewed 03/31/2019.
650 0 _aComputer security.
650 0 _aDark Web.
650 0 _aCyberspace.
653 _aDeepweb.
653 _aDark Web.
653 _aHacker.
653 _aHacktivist.
653 _aCybersecurity.
653 _aCicada 3301.
653 _aThe unknowns.
653 _aAnonymous.
653 _aAtlayo.
653 _aGrams.
653 _aTorch.
653 _aHidden Wiki.
653 _aTor.
653 _aPodesta emails.
653 _aGreg Walton.
653 _aCyberspace.
653 _aSecurity.
653 _aPrivacy.
653 _aCryptography.
653 _aGCHQ.
653 _aGDPR.
653 _aDebian.
653 _aLinux.
653 _aMaltego.
653 _aAl.
655 0 _a[genre]
655 0 _aElectronic books
776 0 8 _iPrint version:
_z9781948976701
830 0 _aBusiness law and corporate risk management collection.
_x2333-6730
856 4 0 _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000854.html
942 _2lcc
_bCIU
_cOB
_eBEP
_QOL
_zBEP9781948976718
999 _c73537
_d73537
902 _c1
_dCynthia Snell