What is included with this book?
Greg Conti is an assistant professor of computer science at the U.S. Military Academy in West Point, New York. His research includes security data visualization, usable security, information warfare, and web-based information disclosure. He is the author of Security Data Visualization (No Starch Press, 2007) and has been featured in IEEE Security & Privacy magazine, Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON, and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project RUMINT. His work can be found at www.gregconti.com/ and www.rumint.org/.
Preface | p. xiii |
Acknowledgments | p. xix |
About the Author | p. xxi |
Googling | p. 1 |
Information Flows and Leakage | p. 31 |
Footprints, Fingerprints, and Connections | p. 59 |
Search | p. 97 |
Communications | p. 139 |
Mapping, Directions, and Imagery | p. 177 |
Advertising and Embedded Content | p. 205 |
Googlebot | p. 239 |
Countermeasures | p. 259 |
Conclusions and a Look to the Future | p. 299 |
Index | p. 317 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.