"synopsis" may belong to another edition of this title.
What is OSINT and what can it do for you?
The Internet has become the defining medium for information exchange in the modern world, but much of it isn’t indexed by search engines. Open source intelligence (OSINT) – intelligence gathered from publically available sources – is the key to unlocking this domain for the purposes of investigation.
The Tao of Open Source Cyber Intelligence provides a comprehensive guide to OSINT techniques for the investigator:
The Tao of Open Source Cyber Intelligence is your guide to the cutting edge of this information collection capability.
About the author
Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security, corporate investigations and geopolitical analysis. The holder of a Master’s degree in Computing and a Master of Letters in Terrorism studies, he is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world’s leading private-sector intelligence and security agencies.
Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security , corporate investigations and geopolitical analysis. The holder of a master’s degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world’s leading private-sector intelligence and security agencies.
"About this title" may belong to another edition of this title.
Shipping:
US$ 2.64
Within U.S.A.
Book Description Condition: New. Seller Inventory # 23768616-n
Book Description Condition: New. Seller Inventory # ABLIING23Mar2912160252435
Book Description Paperback. Condition: New. Brand New! This item is printed on demand. Seller Inventory # 1849287287
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9781849287289_lsuk
Book Description Paperback. Condition: New. Brand New! This item is printed on demand. Seller Inventory # VIB1849287287
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9781849287289
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9781849287289
Book Description Paperback. Condition: New. Special order direct from the distributor. Seller Inventory # ING9781849287289
Book Description Condition: New. Seller Inventory # 23768616-n
Book Description PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # LW-9781849287289