
The Tao of Open Source Intelligence
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $14.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Peter Silverleaf
Acerca de esta escucha
The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms, such as those associated with social media, has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines?
Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation.
The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques for the investigator.
- It catalogs and explains the tools and investigative approaches that are required when conducting research within the surface, deep, and dark webs.
- It explains how to scrutinize criminal activity without compromising your anonymity - and your investigation.
- It examines the relevance of cyber geography and how to get around its limitations.
- It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz, and Carrot2) that collate search data from single-source intelligence platforms such as Google.
- It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools, and specialist search syntax (Google kung fu).
- It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use, and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy.
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.
About the author: Stewart K. Bertram is a career intelligence analyst, who has spent over a decade working across the fields of counterterrorism, cyber security , corporate investigations, and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience.
©2015 IT Governance Publishing (P)2018 IT Governance PublishingLos oyentes también disfrutaron...
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- De: Clint Emerson
- Narrado por: Pete Simonelli
- Duración: 3 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- De Mike Kirby en 11-18-15
De: Clint Emerson
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- De: Philip A. Becnel IV
- Narrado por: Bill Burrows
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- De P DET. Billock en 11-16-18
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- De: Amy B. Zegart
- Narrado por: Amy B. Zegart
- Duración: 11 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- De Cameron en 02-01-22
De: Amy B. Zegart
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
100 Deadly Skills
- The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
- De: Clint Emerson
- Narrado por: Pete Simonelli
- Duración: 3 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers - modified from the world of black ops - to help you take action in numerous "worst case" scenarios from escaping a locked trunk to making an improvised Taser to tricking facial recognition software. With easy-to-understand instructions, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.
-
-
Only a small fraction of the information is useful
- De Mike Kirby en 11-18-15
De: Clint Emerson
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
Introduction to Conducting Private Investigations
- Private Investigator Entry Level (02E)
- De: Philip A. Becnel IV
- Narrado por: Bill Burrows
- Duración: 8 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Introduction to Conducting Private Investigations provides the essential tools you need to become a successful private investigator. From conducting straightforward background investigations to more complicated cases involving accidents and fraud, you will learn the critical skills needed to conduct all types of investigations and build a thriving business. Specifically tailored to meet the requirements established by the Department of Criminal Justice Services, this easy-to-use resource offers an excellent balance between theory and practice.
-
-
Good Stuff!
- De P DET. Billock en 11-16-18
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- De: Amy B. Zegart
- Narrado por: Amy B. Zegart
- Duración: 11 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- De Cameron en 02-01-22
De: Amy B. Zegart
-
Becoming Bulletproof
- Protect Yourself, Read People, Influence Situations, and Live Fearlessly
- De: Evy Poumpouras
- Narrado por: Evy Poumpouras
- Duración: 10 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Becoming Bulletproof means transforming yourself into a stronger, more confident, and more powerful person. Evy Poumpouras - former Secret Service agent to three presidents and one of only five women to receive the Medal of Valor - demonstrates how we can overcome our everyday fears, have difficult conversations, know who to trust and who might not have our best interests at heart, influence situations, and prepare for the unexpected. When you have become bulletproof, you are your best, most courageous, and most powerful version of you.
-
-
Not what I had Anticipated, Much Much Better
- De Terry Goodlad en 05-02-20
De: Evy Poumpouras
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- De: Christopher Hadnagy, Seth Schulman
- Narrado por: Christopher Hadnagy
- Duración: 8 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- De Jessica en 11-30-21
De: Christopher Hadnagy, y otros
-
The Ultimate Guide to ChatGPT
- A Beginner's Handbook to Understanding Prompt Engineering, the Future of Artificial Intelligence and How to Use It Effectively
- De: Percival C. Verena
- Narrado por: KC Wayman
- Duración: 3 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
With this beginner’s handbook, you’ll learn how to use ChatGPT efficiently and create maximized results. Create natural, human-like conversations, being aware of its limitations and biases, and prepare for the artificial intelligence future.
-
-
Bland and generic
- De Matt en 10-10-23
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- De: Christian Brose
- Narrado por: Christian Brose
- Duración: 9 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- De Tomas Singliar en 06-06-20
De: Christian Brose
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De: Wm. Arthur Conklin, Greg White
- Narrado por: Derek Shoales
- Duración: 30 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- De Zak West en 12-03-23
De: Wm. Arthur Conklin, y otros
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De: Joseph Menn
- Narrado por: Jonathan Davis
- Duración: 8 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- De Sam Kopp en 12-18-19
De: Joseph Menn
-
Designing Data-Intensive Applications
- The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
- De: Martin Kleppmann
- Narrado por: Benjamin Lange
- Duración: 20 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
Author Martin Kleppmann helps you navigate the diverse data landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications.
-
-
Must read for senior+ software engineers
- De Navid v en 05-29-21
De: Martin Kleppmann
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- De: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, y otros
- Narrado por: The Voice Gallery
- Duración: 8 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- De Chuck S en 02-12-23
De: Dr. Gerald Auger, y otros
-
AWS: A Comprehensive Guide to Mastering Amazon Web Services
- De: Aaron Hudson
- Narrado por: Mat Clista
- Duración: 4 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
You are about to learn the limitless power of Amazon Web Services (AWS) to decide whether it is the perfect cloud computing solution for your business! Efficient, high performing, and profitable companies around the world have realized that cloud computing is the secret to massive growth and efficiency in service delivery on a global scale especially because it (cloud computing) allows data access from anywhere in the world.
-
-
Outdated material
- De Stacey en 04-11-25
De: Aaron Hudson
Lo que los oyentes dicen sobre The Tao of Open Source Intelligence
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Jack Frasier
- 08-27-20
short with good info
has some essential ideas about the landscape of OSINT technologies and frameworks that can be used by invesigators
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Techdice
- 02-13-22
Very informative
Thou some of the techniques described are a little be out dated, most of the information given is essential in the world of OSINT investigations, the pace and tone of the narrator are perfect
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
- Internet Rando
- 05-06-20
It's a decent introduction to OSINT
The narrator is good, the content is interesting, and it serves as a good introduction to OSINT topics and methods.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña