SKU/Artículo: AMZ-B0GJMV331J

Black Hat OSINT: Leveraging Data Breach Data for Privacy and Intelligence

Format:

Paperback

Kindle

Paperback

Detalles del producto
Disponibilidad:
En stock
Peso con empaque:
0.47 kg
Devolución:
Condición
Nuevo
Producto de:
Amazon
Viaja desde
USA

Sobre este producto
  • Open-source intelligence has been here for ages, and many know what it entails and why it’s used: we use open-source intelligence to find publicly available information to complete a specific task. In other words, it's the process of obtaining and analyzing publicly available information to accomplish a goal. In the present day, open-source intelligence also involves gathering information from public sources to identify patterns and threats that can harm your well-being on the Web and offline. Data breaches are one of the primary threats of such kind. Not only are they dangerous because they can tarnish your reputation, they’re also a two-sided sword for a different reason: stolen data is often twisted and used for open-source intelligence purposes to further steal data. Once data is stolen, it often ends up on the dark Web and inside data breach search engines that add even more fuel to the fire. When this happens, many people hear about stolen data sets. Many people know they’re out there, but do not have a good foundational understanding of just how elaborate the trade of this data has become, and this book will walk you through that. This book will walk you through the mistakes made by developers that open the doors for data theft and tell you how hackers exploit stolen data to cause harm to your well-being. You will understand why data is stolen, what methods attackers use to steal your most valuable assets, what they do with them, and finally, you will understand how your data is leveraged against you through an open-source intelligence lens. Rather than a tooling showcase, this book is framed around how attackers think, how the data breach ecosystem functions, and how personal data becomes weaponized. Follow along and understand the intricacies of methods used by malicious hackers and other nefarious parties to steal data, and be equipped not only to withstand the attacks coming your way, but also to deeply understand the methods you can employ to vanish without a trace on the Web and beyond.
S/ 362.27
49% OFF
S/ 185.78

IMPORT EASILY

By purchasing this product you can deduct VAT with your RUT number

S/ 362.27
49% OFF
S/ 185.78

Hasta 6 cuotas sin intereses con BCP, BBVA y Diners

Llega en 5 a 10 días hábiles
con envío
Tienes garantía de entrega