Black Hat OSINT: Leveraging Data Breach Data for Privacy and Intelligence
Format:
Paperback
Kindle
Paperback
En stock
0.47 kg
Sí
Nuevo
Amazon
USA
- Open-source intelligence has been here for ages, and many know what it entails and why it’s used: we use open-source intelligence to find publicly available information to complete a specific task. In other words, it's the process of obtaining and analyzing publicly available information to accomplish a goal. In the present day, open-source intelligence also involves gathering information from public sources to identify patterns and threats that can harm your well-being on the Web and offline. Data breaches are one of the primary threats of such kind. Not only are they dangerous because they can tarnish your reputation, they’re also a two-sided sword for a different reason: stolen data is often twisted and used for open-source intelligence purposes to further steal data. Once data is stolen, it often ends up on the dark Web and inside data breach search engines that add even more fuel to the fire. When this happens, many people hear about stolen data sets. Many people know they’re out there, but do not have a good foundational understanding of just how elaborate the trade of this data has become, and this book will walk you through that. This book will walk you through the mistakes made by developers that open the doors for data theft and tell you how hackers exploit stolen data to cause harm to your well-being. You will understand why data is stolen, what methods attackers use to steal your most valuable assets, what they do with them, and finally, you will understand how your data is leveraged against you through an open-source intelligence lens. Rather than a tooling showcase, this book is framed around how attackers think, how the data breach ecosystem functions, and how personal data becomes weaponized. Follow along and understand the intricacies of methods used by malicious hackers and other nefarious parties to steal data, and be equipped not only to withstand the attacks coming your way, but also to deeply understand the methods you can employ to vanish without a trace on the Web and beyond.
IMPORT EASILY
By purchasing this product you can deduct VAT with your RUT number
Hasta 6 cuotas sin intereses con BCP, BBVA y Diners
Productos Relacionados
Ver másOtros Productos
Ver másCompra protegida
Disfruta de una experiencia de compra segura y confiable
¿Cómo comprar?
Garantía de entrega
Con Tiendamia todas tus compras cuentan con Garantía de Entrega o devolución total de tu dinero.
Compras 100% seguras y garantizadas, para que pidas lo que sueñas y lo recibas del mundo a tu puerta.
Saber más.¿Cómo solicitar una devolución?
Para solicitar una devolución, el cliente debe realizarlo a través de su cuenta de Tiendamia. Este proceso está sujeto a la aprobación del departamento de Devoluciones (lo cual puede demorar de 48hs a 72hs hábiles). En caso de no tener la opción en la web, el cliente debe contactarse con Atención al Cliente para iniciar la solicitud.
Los productos sin devolución son:
- Los productos que tienen un tiempo de entrega mayor a 20 días hábiles.
- Productos que por su naturaleza no admiten devolución en EE.UU. o China y, por lo tanto, Tiendamia no puede ofrecer la devolución al cliente.
Visa
Mastercard
American Express