Virtual activities made possible by high-bandwidth Internet connectivity have changed societal behavior. As a result, employers, investigators, and intelligence analysts must adopt better strategies for Internet searching in order to protect information assets. Addressing legal, policy, privacy, and management issues, this book provides a procedural framework for effective searching. The text describes the proper use of Internet vetting, investigations, and open-source intelligence and offers solutions to common stumbling blocks that prevent the adoption of appropriate defenses against those who misuse information systems.…mehr
Virtual activities made possible by high-bandwidth Internet connectivity have changed societal behavior. As a result, employers, investigators, and intelligence analysts must adopt better strategies for Internet searching in order to protect information assets. Addressing legal, policy, privacy, and management issues, this book provides a procedural framework for effective searching. The text describes the proper use of Internet vetting, investigations, and open-source intelligence and offers solutions to common stumbling blocks that prevent the adoption of appropriate defenses against those who misuse information systems.
Edward J. (Ed) Appel, Sr., is owner-principal of iNameCheck, a boutique private investigative, consulting, and training firm. He is a retired FBI special agent and executive, specializing in counterintelligence and terrorism, and served as the director of counterintelligence and security programs at the National Security Council and the White House.
Inhaltsangabe
BEHAVIORAL AND TECHNICAL CONTEXT. The Internet's Potential for Investigators and Intelligence Officers. Social and Technological Change. Use and Abuse: Crime on the Internet. Implications for the Enterprise. LEGAL AND POLICY CONTEXT. Legal, Privacy and Management Issues in Internet Investigations. Business and the Internet. Government and the Internet. Academia, Nonprofits and the Internet. FRAMEWORK FOR INTERNET SEARCHING. Guidelines for Internet Vetting, Investigations and Open-Source Intelligence. Search, Exploitation, Attribution and Verification. Tools, Techniques and Training. Emerging Issues. End Notes. Bibliography.
BEHAVIORAL AND TECHNICAL CONTEXT. The Internet's Potential for Investigators and Intelligence Officers. Social and Technological Change. Use and Abuse: Crime on the Internet. Implications for the Enterprise. LEGAL AND POLICY CONTEXT. Legal, Privacy and Management Issues in Internet Investigations. Business and the Internet. Government and the Internet. Academia, Nonprofits and the Internet. FRAMEWORK FOR INTERNET SEARCHING. Guidelines for Internet Vetting, Investigations and Open-Source Intelligence. Search, Exploitation, Attribution and Verification. Tools, Techniques and Training. Emerging Issues. End Notes. Bibliography.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309