Hunting cyber criminals : (Record no. 1946)

MARC details
000 -LEADER
fixed length control field 02335nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250221163747.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250221b ph ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119540922
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV 8079.C65 .T76 2020
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Troia, Vinny
Relator term author
245 ## - TITLE STATEMENT
Title Hunting cyber criminals :
Remainder of title a hacker's guide to online intelligence gathering tools and techniques /
Statement of responsibility, etc. Vinny Troia
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, Indiana :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2020.
300 ## - PHYSICAL DESCRIPTION
Extent 503 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD28.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Network Exploration. Getting Started -- Investigations and Threat Actors -- Network Exploration -- Manual Network Exploration -- Looking for Network Activity (Advanced NMAP Techniques) -- Automated Tools for Network Discovery -- Web Exploration. Web Exploration -- Website Information Gathering -- Directory Hunting -- Search Engine Dorks -- WHOIS -- Certificate Transparency and Internet Archives -- Iris by DomainTools -- Digging for Gold. Digging for Gold -- Document Metadata -- Interesting Places to Look -- Publicly Accessible Data Storage -- People Hunting. People Hunting -- Researching People, Images, and Locations -- Searching Social Media -- Profile Tracking and Password Reset Clues -- Passwords, Dumps, and Data Viper -- Interacting with Threat Actors -- Cutting through the Disinformation of a 10-Million-Dollar Hack -- Epilogue.
520 ## - SUMMARY, ETC.
Summary, etc. The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element HACKING
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PIRATAGE INFORMATIQUE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Multimedia Arts and Animation LRC - Main National University - Manila General Circulation 01/20/2025 Purchased - Amazon 28.00   GC HV 8079.C65 .T76 2020 c.2 NULIB000020536 02/21/2025 c.2 Books