"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"--
"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"--Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Micah Lee is a renowned investigative journalist and computer security engineer celebrated for securing Edward Snowden’s NSA leak. He is the director of information security at The Intercept and an advisor to the transparency collective Distributed Denial of Secrets. A former EFF staff technologist and Freedom of the Press Foundation co-founder, Lee is also a Tor Project contributor and the developer of open source security tools like OnionShare and Dangerzone.
Inhaltsangabe
Introduction Part 1: Sources and Datasets Chapter 1: Protecting Sources and Yourself Chapter 2: Acquiring Datasets Part 2: Tools of the Trade Chapter 3: The Command Line Interface Chapter 4: Exploring Datasets in the Terminal Chapter 5: Docker, Aleph, and Making Datasets Searchable Chapter 6: Reading Other People's Emails Part 3: Writing Code Chapter 7: An Introduction to Python Chapter 8: Working with Data in Python Part 4: Structured Data Chapter 9: BlueLeaks, Black Lives Matter, and the CSV File Format Chapter 10: BlueLeaks Explorer Chapter 11: Parler, the Insurrection of January 6, and the JSON File Format Chapter 12: Epik Fail, Extremism Research, and SQL Databases Part 5: Case Studies Chapter 13: Pandemic Profiteers and COVID-19 Disinformation Chapter 14: Neo-Nazis and Their Chat Rooms Afterword Appendixes Appendix A: Using the Windows Subsystem for Linux Appendix B: Scraping the Web
Introduction Part 1: Sources and Datasets Chapter 1: Protecting Sources and Yourself Chapter 2: Acquiring Datasets Part 2: Tools of the Trade Chapter 3: The Command Line Interface Chapter 4: Exploring Datasets in the Terminal Chapter 5: Docker, Aleph, and Making Datasets Searchable Chapter 6: Reading Other People's Emails Part 3: Writing Code Chapter 7: An Introduction to Python Chapter 8: Working with Data in Python Part 4: Structured Data Chapter 9: BlueLeaks, Black Lives Matter, and the CSV File Format Chapter 10: BlueLeaks Explorer Chapter 11: Parler, the Insurrection of January 6, and the JSON File Format Chapter 12: Epik Fail, Extremism Research, and SQL Databases Part 5: Case Studies Chapter 13: Pandemic Profiteers and COVID-19 Disinformation Chapter 14: Neo-Nazis and Their Chat Rooms Afterword Appendixes Appendix A: Using the Windows Subsystem for Linux Appendix B: Scraping the Web
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309